![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
The last ten years have seen a great flowering of the theory of digital data modulation. This book is a treatise on digital modulation theory, with an emphasis on these more recent innovations. It has its origins in a collabor ation among the authors that began in 1977. At that time it seemed odd to us that the subjects of error-correcting codes and data modulation were so separated; it seemed also that not enough understanding underlay the mostly ad hoc approaches to data transmission. A great many others were intrigued, too, and the result was a large body of new work that makes up most of this book. Now the older disciplines of detection theory and coding theory have been generalized and applied to the point where it is hard to tell where these end and the theories of signal design and modulation begin. Despite our emphasis on the events of the last ten years, we have included all the traditional topics of digital phase modulation. Signal space concepts are developed, as are simple phase-shift-keyed and pulse-shaped modulations; receiver structures are discussed, from the simple linear receiver to the Viterbi algorithm; the effects of channel filtering and of hardlimiting are described. The volume thus serves well as a pedagogical book for research engineers in industry and second-year graduate students in communications engineering. The production of a manageable book required that many topics be left out."
This book constitutes the refereed proceedings of the 5th IFIP WG 13.2 International Conference on Human-Centered Software Engineering, HCSE 2014, held in Paderborn, Germany, in September 2014. The 13 full papers and 10 short papers presented together with one keynote were carefully reviewed and selected from 35 submissions. The papers cover various topics such as integration of software engineering and user-centered design; HCI models and model-driven engineering; incorporating guidelines and principles for designing usable products in the development process; usability engineering; methods for user interface design; patterns in HCI and HCSE; software architectures for user interfaces; user interfaces for special environments; representations for design in the development process; working with iterative and agile process models in HCSE; social and organizational aspects in the software development lifecycle; human-centric software development tools; user profiles and mental models; user requirements and design constraints; and user experience and software design.
This book constitutes the refereed proceedings of the 12th
European
This book constitutes revised selected papers from the Conference on Energy Efficiency in Large Scale Distributed Systems, EE-LSDS, held in Vienna, Austria, in April 2013. It served as the final event of the COST Action IC0804 which started in May 2009. The 15 full papers presented in this volume were carefully reviewed and selected from 31 contributions. In addition, 7 short papers and 3 demo papers are included in this book. The papers are organized in sections named: modeling and monitoring of power consumption; distributed, mobile and cloud computing; HPC computing; wired and wireless networking; and standardization issues.
This book constitutes the revised selected papers of the Second International Conference on Networked Systems, NETYS 2014, held in Marrakech, Morocco, in May 2014. The 20 full papers and the 6 short papers presented together with 2 keynotes were carefully reviewed and selected from 80 submissions. They address major topics such as multi-core architectures; concurrent and distributed algorithms; middleware environments; storage clusters; social networks; peer-to-peer networks; sensor networks; wireless and mobile networks; as well as privacy and security measures to protect such networked systems and data from attack and abuse.
This book constitutes the refereed proceedings of the 13th
International Symposium on Privacy Enhancing Technologies, PET
2013, held in Bloomington, IN, USA, in July 2013.
This book constitutes the refereed proceedings of six workshops of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, June 2013. The 37 revised full papers are organized in topical sections on the six following workshops: The International Workshop on Big Data Management on Emerging Hardware (HardBD 2013), the Second International Workshop on Massive Data Storage and Processing (MDSP 2013), the First International Workshop on Emergency Management in Big Data Age (BigEM 2013), the International Workshop on Trajectory Mining in Social Networks (TMSN 2013), the First International Workshop on Location-based Query Processing in Mobile Environments (LQPM 2013), and the First International Workshop on Big Data Management and Service (BDMS 2013).
The motivation for this book stems from an early exposure to the book Ap plied Mechanics by John Perry. Professor Perry strove to encourage his readers to understand the applications and use of mathematics in engineering with out insisting that they become immersed in pure mathematics. The following text uses this approach to the application of telecommunications switching. Readers wishing to study the derivation and proof of formulas will be able to do so using relevant references. The existence of low-cost programmable calculators frees practicing engineers from much laborious calculation, allowing more time for creative design and application of the art. The reader should not need to be able to derive formulas in order to apply them just as, to quote Professor Perry, "He should not have to be able to design a watch in order to tell time ... The material for this book has been drawn from my own experience in the field. Inevitably, however, I have used CCITT and Bell System publications for references and in some cases quotation, and I gratefully acknowledge permission for their use. I am also grateful to Stromberg Carlson Corporation for their earlier encour agement and support without which this book would not have been possible. Thanks are also due to Fred Hadfield for his advice and assistance in the preparation of the many figures and to my wife Ada for her support and patience as I pursued the demanding but interesting task of producing the text."
In the development of telecommunication networks throughout the world, digital transmission has now replaced analog transmission as the predominant choice for new transmission facilities. This trend began in the early 1960s when the American Telephone and Telegraph Company first introduced pulse code modulation as a means of increasing capacity in their cable plant. Since that time, digital transmission applications have grown dramatically, notably in the United States, Canada, Japan, and Western Europe. With the rapidity of digital transmission developments and imple mentation, however, there has been a surprising lack of textbooks written on the subject. This book grew out of my work, research, and teaching in digital transmission systems. My objective is to provide an overview of the subject. To accomplish this end, theory has been blended with practice in order to illustrate how one applies theoretical principles to actual design and imple mentation. The book has abundant design examples and references to actual systems. These examples have been drawn from common carriers, manufac turers, and my own experience. Considerable effort has been made to include up-to-date standards, such as those published by the CCITT and CCIR, and to interpret their recommendations in the context of present-day digital transmission systems."
This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014. The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.
Complex Social Networks is a newly emerging (hot) topic with applications in a variety of domains, such as communication networks, engineering networks, social networks, and biological networks. In the last decade, there has been an explosive growth of research on complex real-world networks, a theme that is becoming pervasive in many disciplines, ranging from mathematics and computer science to the social and biological sciences. Optimization of complex communication networks requires a deep understanding of the interplay between the dynamics of the physical network and the information dynamics within the network. Although there are a few books addressing social networks or complex networks, none of them has specially focused on the optimization perspective of studying these networks. This book provides the basic theory of complex networks with several new mathematical approaches and optimization techniques to design and analyze dynamic complex networks. A wide range of applications and optimization problems derived from research areas such as cellular and molecular chemistry, operations research, brain physiology, epidemiology, and ecology.
This book constitutes the refereed proceedings of the 12th International Conference on Software Engineering and Formal Methods, SEFM 2014, held in Grenoble, France, in September 2014. The 23 full papers presented together with 3 invited and 6 tool papers were carefully reviewed and selected from 106 submissions. They are organized in topical section on program verification, testing, component-based systems, real-time and embedded systems, model checking and automata learning, program correctness, and adaptive and multi-agent systems.
When we were first approached by Dr. Lucky to write this book we were very enthusiastic about the prospect, since we had contemplated a similar project for quite some time. The difficulty lay in how best to digest the vast amount of data on optical propagation, reduce it to a book of manageable size, and simultaneously form the transition from the physics of propagation to the engineering of optical channels. This is the intent of Optical Channels. In accomplishing our goal it was necessary to condense the material on optical propagation and, in so doing, we have left a large amount to be handled via references. We have tried to make these decisions in a consistent manner so that the book will be uniform in its treatment of this topic. We identify four channels for consideration: the free-space channel, which: is characteristic of a tranquil atmosphere or a space-to-space link; the turbulent channel, which is characteristic of the atmospheric channel; the scatter channel in two forms, clouds and water; and the fiber optic channel. For each of these channels we have tried to reduce the applicable propagation theory to a level that can be used for engineering design. This has been done by example, but here again decisions had to be made on which examples to present. We have not tried to present any material on optical components and consequently other references on engineering would be necessary to supplement this book.
This book constitutes the refereed proceedings of the 7th International Conference on Data Management in Grid and Peer-to-Peer Systems, Globe 2014, held in Munich, Germany, in September 2014, in conjunction with DEXA 2014. The 7 revised full papers presented were carefully reviewed and selected from 14 submissions. The papers are organized in the following topical sections: query processing in cloud, grid, and P2P systems: optimization and recommendation; MapReduce framework: data privacy and similarity search; data management in grid systems: protocol and recovery failure.
Performance of Web Services provides innovative techniques to improve the performance of Web Services, as well as QoS (Quality of Service) requirements. This includes Qos performance, reliability and security. The author presents two levels of Web Services: the "kernel" (ithe SOAP engine which delivers messages from one point to another through various networks), and the "server side" (which processes heavy load / requests). The primary objective of this book is execution of applications delivered in a timely fashion. Case studies and examples are provided throughout this book.
This is an elementary textbook on an advanced topic: broadband telecommunica tion networks. I must declare at the outset that this book is not primarily intended for an audience of telecommunication specialists who are weIl versed in the concepts, system architectures, and underlying technologies of high-speed, multi media, bandwidth-on-demand, packet-switching networks, although the techni caIly sophisticated telecommunication practitioner may wish to use it as a refer ence. Nor is this book intended to be an advanced textbook on the subject of broadband networks. Rather, this book is primarily intended for those eager to leam more about this exciting fron tier in the field of telecommunications, an audience that includes systems designers, hardware and software engineers, en gineering students, R&D managers, and market planners who seek an understand ing of local-, metropolitan-, and wide-area broadband networks for integrating voice, data, image, and video. Its primary audience also includes researchers and engineers from other disciplines or other branches of telecommunications who anticipate a future involvement in, or who would simply like to leam more about, the field of broadband networks, along with scientific researchers and corporate telecommunication and data communication managers whose increasingly sophis ticated applications would benefit from (and drive the need for) broadband net works. Advanced topics are certainly not ignored (in fact, a plausible argument could be mounted that aIl of the material is advanced, given the infancy of the topic).
This book constitutes the thoroughly refereed post-conference proceedings of the Joint International Conference on Pervasive Computing and Web Society, ICPCA/SWS 2013, held in Vina de Mar, Chile, in December 2013. The 56 revised full papers presented together with 29 poster papers were carefully reviewed and selected from 156 submissions. The papers are organized in topical sections on infrastructure and devices; service and solution; data and knowledge; as well as community.
This book constitutes the refereed proceedings of the 26th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2014, held in Istanbul, Turkey, in September 2014. The 11 revised full papers presented together with 6 short papers were carefully selected from 36 submissions. The scope of the conference was on following topics: testing methodologies, tools and frameworks, and industrial experiences.
This book constitutes the thoroughly refereed proceedings of the fourth International Conference on Ad Hoc Networks, ADHOCNETS 2012, held in Paris, France, in October 2012. The 18 revised full papers presented were carefully selected and reviewed from 43 submissions. These - and 6 invited papers now cover and even broader scope, referring to many types of autonomous wireless networks designed and deployed for a specific task or function, such as wireless sensor networks, vehicular networks, and home networks. They are organized in topical sections on MAC and PHY layers, localization and position-based protocols in WSNs, resource allocations and cognitive radio, key, service and caching management, network architectures and frameworks, and mobility and disconnection management.
ISGC 2009, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan in April 2009 bringing together prestigious scientists and engineers worldwide to exchange ideas, present challenges/solutions and introduce future development in the field of Grid Computing. Managed Grids and Cloud Systems in the Asia-Pacific Research Community presents the latest achievements in grid technology including Cloud Computing. This volume also covers international projects in Grid Operation, Grid Middleware, E-Science applications, technical developments in grid operations and management, Security and Networking, Digital Library and more. The resources used to support these advances, such as volunteer grids, production managed grids, and cloud systems are discussed in detail. This book is designed for a professional audience composed of grid users, developers and researchers working in the grid computing. Advanced-level students focusing on computer science and engineering will find this book valuable as a reference or secondary text book.
This book constitutes the proceedings of the 15th International Conference on Web Information Systems Engineering, WISE 2014, held in Thessaloniki, Greece, in October 2014. The 52 full papers, 16 short and 14 poster papers, presented in the two-volume proceedings LNCS 8786 and 8787 were carefully reviewed and selected from 196 submissions. They are organized in topical sections named: Web mining, modeling and classification; Web querying and searching; Web recommendation and personalization; semantic Web; social online networks; software architectures amd platforms; Web technologies and frameworks; Web innovation and applications; and challenge.
This book constitutes the proceedings of the 15th International Conference on Web Information Systems Engineering, WISE 2014, held in Thessaloniki, Greece, in October 2014. The 52 full papers, 16 short and 14 poster papers, presented in the two-volume proceedings LNCS 8786 and 8787 were carefully reviewed and selected from 196 submissions. They are organized in topical sections named: Web mining, modeling and classification; Web querying and searching; Web recommendation and personalization; semantic Web; social online networks; software architectures amd platforms; Web technologies and frameworks; Web innovation and applications; and challenge.
Congestion Control in Data Transmission Networks details the modeling and control of data traffic in communication networks. It shows how various networking phenomena can be represented in a consistent mathematical framework suitable for rigorous formal analysis. The monograph differentiates between fluid-flow continuous-time traffic models, discrete-time processes with constant sampling rates, and sampled-data systems with variable discretization periods. The authors address a number of difficult real-life problems, such as: optimal control of flows with disparate, time-varying delay; the existence of source and channel nonlinearities; the balancing of quality of service and fairness requirements; and the incorporation of variable rate allocation policies. Appropriate control mechanisms which can handle congestion and guarantee high throughput in various traffic scenarios (with different networking phenomena being considered) are proposed. Systematic design procedures using sound control-theoretic foundations are adopted. Since robustness issues are of major concern in providing efficient data-flow regulation in today's networks, sliding-mode control is selected as the principal technique to be applied in creating the control solutions. The controller derivation is given extensive analytical treatment and is supported with numerous realistic simulations. A comparison with existing solutions is also provided. The concepts applied are discussed in a number of illustrative examples, and supported by many figures, tables, and graphs walking the reader through the ideas and introducing their relevance in real networks. Academic researchers and graduate students working in computer networks and telecommunications and in control (especially time-delay systems and discrete-time optimal and sliding-mode control) will find this text a valuable assistance in ensuring smooth data-flow within communications networks.
This book constitutes the refereed proceedings of the 17th
International Conference on Distributed Computer and Communication
Networks, DCCN 2013, held in Moscow, Russia, in October 2013. |
You may like...
Fault Tolerant Architectures for…
Sikhar Patranabis, Debdeep Mukhopadhyay
Hardcover
R3,802
Discovery Miles 38 020
Architectural Design - Conception and…
Chris A. Vissers, Luis Ferreira Pires, …
Hardcover
Malicious Attack Propagation and Source…
Jiaojiao Jiang, Sheng Wen, …
Hardcover
R3,336
Discovery Miles 33 360
Design and Implementation of Practical…
Akshay Kumar, Ahmed Abdelhadi, …
Hardcover
R2,663
Discovery Miles 26 630
Wireless Sensor Networks - Security…
Rastko R. Selmic, Vir V Phoha, …
Hardcover
R2,522
Discovery Miles 25 220
EAI International Conference on Big Data…
Anandakumar Haldorai, Arulmurugan Ramu, …
Hardcover
R4,074
Discovery Miles 40 740
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,633
Discovery Miles 66 330
|