![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This volume constitutes the refereed proceedings of the following 9 international workshops: OTM Academy, OTM Industry Case Studies Program, Cloud and Trusted Computing, C&TC, Enterprise Integration, Interoperability, and Networking, EI2N, Industrial and Business Applications of Semantic Web Technologies, INBAST, Information Systems, om Distributed Environment, ISDE, Methods, Evaluation, Tools and Applications for the Creation and Consumption of Structured Data for the e-Society, META4eS, Mobile and Social Computing for collaborative interactions, MSC, and Ontology Content, OnToContent 2014. These workshops were held as associated events at OTM 2014, the federated conferences "On The Move Towards Meaningful Internet Systems and Ubiquitous Computing", in Amantea, Italy, in October 2014. The 56 full papers presented together with 8 short papers, 6 posters and 5 keynotes were carefully reviewed and selected from a total of 96 submissions. The focus of the workshops were on the following subjects models for interoperable infrastructures, applications, privacy and access control, reliability and performance, cloud and configuration management, interoperability in (System-of-)Systems, distributed information systems applications, architecture and process in distributed information system, distributed information system development and operational environment, ontology is use for eSociety, knowledge management and applications for eSociety, social networks and social services, social and mobile intelligence, and multimodal interaction and collaboration.
Peer-to-peer (P2P) technology, or peer computing, is a paradigm that is viewed as a potential technology for redesigning distributed architectures and, consequently, distributed processing. Yet the scale and dynamism that characterize P2P systems demand that we reexamine traditional distributed technologies. A paradigm shift that includes self-reorganization, adaptation and resilience is called for. On the other hand, the increased computational power of such networks opens up completely new applications, such as in digital content sharing, scientific computation, gaming, or collaborative work environments. In this book, Vu, Lupu and Ooi present the technical challenges offered by P2P systems, and the means that have been proposed to address them. They provide a thorough and comprehensive review of recent advances on routing and discovery methods; load balancing and replication techniques; security, accountability and anonymity, as well as trust and reputation schemes; programming models and P2P systems and projects. Besides surveying existing methods and systems, they also compare and evaluate some of the more promising schemes. The need for such a book is evident. It provides a single source for practitioners, researchers and students on the state of the art. For practitioners, this book explains best practice, guiding selection of appropriate techniques for each application. For researchers, this book provides a foundation for the development of new and more effective methods. For students, it is an overview of the wide range of advanced techniques for realizing effective P2P systems, and it can easily be used as a text for an advanced course on Peer-to-Peer Computing and Technologies, or as a companion text for courses on various subjects, such as distributed systems, and grid and cluster computing.
The last ten years have seen a great flowering of the theory of digital data modulation. This book is a treatise on digital modulation theory, with an emphasis on these more recent innovations. It has its origins in a collabor ation among the authors that began in 1977. At that time it seemed odd to us that the subjects of error-correcting codes and data modulation were so separated; it seemed also that not enough understanding underlay the mostly ad hoc approaches to data transmission. A great many others were intrigued, too, and the result was a large body of new work that makes up most of this book. Now the older disciplines of detection theory and coding theory have been generalized and applied to the point where it is hard to tell where these end and the theories of signal design and modulation begin. Despite our emphasis on the events of the last ten years, we have included all the traditional topics of digital phase modulation. Signal space concepts are developed, as are simple phase-shift-keyed and pulse-shaped modulations; receiver structures are discussed, from the simple linear receiver to the Viterbi algorithm; the effects of channel filtering and of hardlimiting are described. The volume thus serves well as a pedagogical book for research engineers in industry and second-year graduate students in communications engineering. The production of a manageable book required that many topics be left out."
This book constitutes the refereed proceedings of the 5th IFIP WG 13.2 International Conference on Human-Centered Software Engineering, HCSE 2014, held in Paderborn, Germany, in September 2014. The 13 full papers and 10 short papers presented together with one keynote were carefully reviewed and selected from 35 submissions. The papers cover various topics such as integration of software engineering and user-centered design; HCI models and model-driven engineering; incorporating guidelines and principles for designing usable products in the development process; usability engineering; methods for user interface design; patterns in HCI and HCSE; software architectures for user interfaces; user interfaces for special environments; representations for design in the development process; working with iterative and agile process models in HCSE; social and organizational aspects in the software development lifecycle; human-centric software development tools; user profiles and mental models; user requirements and design constraints; and user experience and software design.
This book constitutes the refereed proceedings of the 12th
European
This book constitutes revised selected papers from the Conference on Energy Efficiency in Large Scale Distributed Systems, EE-LSDS, held in Vienna, Austria, in April 2013. It served as the final event of the COST Action IC0804 which started in May 2009. The 15 full papers presented in this volume were carefully reviewed and selected from 31 contributions. In addition, 7 short papers and 3 demo papers are included in this book. The papers are organized in sections named: modeling and monitoring of power consumption; distributed, mobile and cloud computing; HPC computing; wired and wireless networking; and standardization issues.
This book constitutes the revised selected papers of the Second International Conference on Networked Systems, NETYS 2014, held in Marrakech, Morocco, in May 2014. The 20 full papers and the 6 short papers presented together with 2 keynotes were carefully reviewed and selected from 80 submissions. They address major topics such as multi-core architectures; concurrent and distributed algorithms; middleware environments; storage clusters; social networks; peer-to-peer networks; sensor networks; wireless and mobile networks; as well as privacy and security measures to protect such networked systems and data from attack and abuse.
This book constitutes the refereed proceedings of the 13th
International Symposium on Privacy Enhancing Technologies, PET
2013, held in Bloomington, IN, USA, in July 2013.
This book constitutes the refereed proceedings of six workshops of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, June 2013. The 37 revised full papers are organized in topical sections on the six following workshops: The International Workshop on Big Data Management on Emerging Hardware (HardBD 2013), the Second International Workshop on Massive Data Storage and Processing (MDSP 2013), the First International Workshop on Emergency Management in Big Data Age (BigEM 2013), the International Workshop on Trajectory Mining in Social Networks (TMSN 2013), the First International Workshop on Location-based Query Processing in Mobile Environments (LQPM 2013), and the First International Workshop on Big Data Management and Service (BDMS 2013).
The motivation for this book stems from an early exposure to the book Ap plied Mechanics by John Perry. Professor Perry strove to encourage his readers to understand the applications and use of mathematics in engineering with out insisting that they become immersed in pure mathematics. The following text uses this approach to the application of telecommunications switching. Readers wishing to study the derivation and proof of formulas will be able to do so using relevant references. The existence of low-cost programmable calculators frees practicing engineers from much laborious calculation, allowing more time for creative design and application of the art. The reader should not need to be able to derive formulas in order to apply them just as, to quote Professor Perry, "He should not have to be able to design a watch in order to tell time ... The material for this book has been drawn from my own experience in the field. Inevitably, however, I have used CCITT and Bell System publications for references and in some cases quotation, and I gratefully acknowledge permission for their use. I am also grateful to Stromberg Carlson Corporation for their earlier encour agement and support without which this book would not have been possible. Thanks are also due to Fred Hadfield for his advice and assistance in the preparation of the many figures and to my wife Ada for her support and patience as I pursued the demanding but interesting task of producing the text."
In the development of telecommunication networks throughout the world, digital transmission has now replaced analog transmission as the predominant choice for new transmission facilities. This trend began in the early 1960s when the American Telephone and Telegraph Company first introduced pulse code modulation as a means of increasing capacity in their cable plant. Since that time, digital transmission applications have grown dramatically, notably in the United States, Canada, Japan, and Western Europe. With the rapidity of digital transmission developments and imple mentation, however, there has been a surprising lack of textbooks written on the subject. This book grew out of my work, research, and teaching in digital transmission systems. My objective is to provide an overview of the subject. To accomplish this end, theory has been blended with practice in order to illustrate how one applies theoretical principles to actual design and imple mentation. The book has abundant design examples and references to actual systems. These examples have been drawn from common carriers, manufac turers, and my own experience. Considerable effort has been made to include up-to-date standards, such as those published by the CCITT and CCIR, and to interpret their recommendations in the context of present-day digital transmission systems."
This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014. The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.
Complex Social Networks is a newly emerging (hot) topic with applications in a variety of domains, such as communication networks, engineering networks, social networks, and biological networks. In the last decade, there has been an explosive growth of research on complex real-world networks, a theme that is becoming pervasive in many disciplines, ranging from mathematics and computer science to the social and biological sciences. Optimization of complex communication networks requires a deep understanding of the interplay between the dynamics of the physical network and the information dynamics within the network. Although there are a few books addressing social networks or complex networks, none of them has specially focused on the optimization perspective of studying these networks. This book provides the basic theory of complex networks with several new mathematical approaches and optimization techniques to design and analyze dynamic complex networks. A wide range of applications and optimization problems derived from research areas such as cellular and molecular chemistry, operations research, brain physiology, epidemiology, and ecology.
This book constitutes the refereed proceedings of the 12th International Conference on Software Engineering and Formal Methods, SEFM 2014, held in Grenoble, France, in September 2014. The 23 full papers presented together with 3 invited and 6 tool papers were carefully reviewed and selected from 106 submissions. They are organized in topical section on program verification, testing, component-based systems, real-time and embedded systems, model checking and automata learning, program correctness, and adaptive and multi-agent systems.
When we were first approached by Dr. Lucky to write this book we were very enthusiastic about the prospect, since we had contemplated a similar project for quite some time. The difficulty lay in how best to digest the vast amount of data on optical propagation, reduce it to a book of manageable size, and simultaneously form the transition from the physics of propagation to the engineering of optical channels. This is the intent of Optical Channels. In accomplishing our goal it was necessary to condense the material on optical propagation and, in so doing, we have left a large amount to be handled via references. We have tried to make these decisions in a consistent manner so that the book will be uniform in its treatment of this topic. We identify four channels for consideration: the free-space channel, which: is characteristic of a tranquil atmosphere or a space-to-space link; the turbulent channel, which is characteristic of the atmospheric channel; the scatter channel in two forms, clouds and water; and the fiber optic channel. For each of these channels we have tried to reduce the applicable propagation theory to a level that can be used for engineering design. This has been done by example, but here again decisions had to be made on which examples to present. We have not tried to present any material on optical components and consequently other references on engineering would be necessary to supplement this book.
This book constitutes the refereed proceedings of the 7th International Conference on Data Management in Grid and Peer-to-Peer Systems, Globe 2014, held in Munich, Germany, in September 2014, in conjunction with DEXA 2014. The 7 revised full papers presented were carefully reviewed and selected from 14 submissions. The papers are organized in the following topical sections: query processing in cloud, grid, and P2P systems: optimization and recommendation; MapReduce framework: data privacy and similarity search; data management in grid systems: protocol and recovery failure.
Performance of Web Services provides innovative techniques to improve the performance of Web Services, as well as QoS (Quality of Service) requirements. This includes Qos performance, reliability and security. The author presents two levels of Web Services: the "kernel" (ithe SOAP engine which delivers messages from one point to another through various networks), and the "server side" (which processes heavy load / requests). The primary objective of this book is execution of applications delivered in a timely fashion. Case studies and examples are provided throughout this book.
This is an elementary textbook on an advanced topic: broadband telecommunica tion networks. I must declare at the outset that this book is not primarily intended for an audience of telecommunication specialists who are weIl versed in the concepts, system architectures, and underlying technologies of high-speed, multi media, bandwidth-on-demand, packet-switching networks, although the techni caIly sophisticated telecommunication practitioner may wish to use it as a refer ence. Nor is this book intended to be an advanced textbook on the subject of broadband networks. Rather, this book is primarily intended for those eager to leam more about this exciting fron tier in the field of telecommunications, an audience that includes systems designers, hardware and software engineers, en gineering students, R&D managers, and market planners who seek an understand ing of local-, metropolitan-, and wide-area broadband networks for integrating voice, data, image, and video. Its primary audience also includes researchers and engineers from other disciplines or other branches of telecommunications who anticipate a future involvement in, or who would simply like to leam more about, the field of broadband networks, along with scientific researchers and corporate telecommunication and data communication managers whose increasingly sophis ticated applications would benefit from (and drive the need for) broadband net works. Advanced topics are certainly not ignored (in fact, a plausible argument could be mounted that aIl of the material is advanced, given the infancy of the topic).
This book constitutes the thoroughly refereed post-conference proceedings of the Joint International Conference on Pervasive Computing and Web Society, ICPCA/SWS 2013, held in Vina de Mar, Chile, in December 2013. The 56 revised full papers presented together with 29 poster papers were carefully reviewed and selected from 156 submissions. The papers are organized in topical sections on infrastructure and devices; service and solution; data and knowledge; as well as community.
This book constitutes the refereed proceedings of the 26th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2014, held in Istanbul, Turkey, in September 2014. The 11 revised full papers presented together with 6 short papers were carefully selected from 36 submissions. The scope of the conference was on following topics: testing methodologies, tools and frameworks, and industrial experiences.
This book constitutes the thoroughly refereed proceedings of the fourth International Conference on Ad Hoc Networks, ADHOCNETS 2012, held in Paris, France, in October 2012. The 18 revised full papers presented were carefully selected and reviewed from 43 submissions. These - and 6 invited papers now cover and even broader scope, referring to many types of autonomous wireless networks designed and deployed for a specific task or function, such as wireless sensor networks, vehicular networks, and home networks. They are organized in topical sections on MAC and PHY layers, localization and position-based protocols in WSNs, resource allocations and cognitive radio, key, service and caching management, network architectures and frameworks, and mobility and disconnection management.
ISGC 2009, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan in April 2009 bringing together prestigious scientists and engineers worldwide to exchange ideas, present challenges/solutions and introduce future development in the field of Grid Computing. Managed Grids and Cloud Systems in the Asia-Pacific Research Community presents the latest achievements in grid technology including Cloud Computing. This volume also covers international projects in Grid Operation, Grid Middleware, E-Science applications, technical developments in grid operations and management, Security and Networking, Digital Library and more. The resources used to support these advances, such as volunteer grids, production managed grids, and cloud systems are discussed in detail. This book is designed for a professional audience composed of grid users, developers and researchers working in the grid computing. Advanced-level students focusing on computer science and engineering will find this book valuable as a reference or secondary text book.
This book constitutes the proceedings of the 15th International Conference on Web Information Systems Engineering, WISE 2014, held in Thessaloniki, Greece, in October 2014. The 52 full papers, 16 short and 14 poster papers, presented in the two-volume proceedings LNCS 8786 and 8787 were carefully reviewed and selected from 196 submissions. They are organized in topical sections named: Web mining, modeling and classification; Web querying and searching; Web recommendation and personalization; semantic Web; social online networks; software architectures amd platforms; Web technologies and frameworks; Web innovation and applications; and challenge.
This book constitutes the proceedings of the 15th International Conference on Web Information Systems Engineering, WISE 2014, held in Thessaloniki, Greece, in October 2014. The 52 full papers, 16 short and 14 poster papers, presented in the two-volume proceedings LNCS 8786 and 8787 were carefully reviewed and selected from 196 submissions. They are organized in topical sections named: Web mining, modeling and classification; Web querying and searching; Web recommendation and personalization; semantic Web; social online networks; software architectures amd platforms; Web technologies and frameworks; Web innovation and applications; and challenge. |
You may like...
Security and Privacy - Silver Linings in…
Kai Rannenberg, Vijay Varadharajan, …
Hardcover
R1,446
Discovery Miles 14 460
Secure Smart Embedded Devices, Platforms…
Konstantinos Markantonakis, Keith Mayes
Hardcover
R5,927
Discovery Miles 59 270
Designing Embedded Internet Devices
Brian DeMuth, Dan Eisenreich
Paperback
R1,530
Discovery Miles 15 300
Handbook of Research on Web Log Analysis
Bernard J Jansen, Amanda Spink, …
Hardcover
R6,726
Discovery Miles 67 260
Internet of Things - A Hands-On Approach
Arshdeep Bahga, Vijay Madisetti
Hardcover
|