0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (25)
  • R500+ (373)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking standards & protocols

Broadband Matching: Theory And Implementations (Third Edition) (Hardcover, 3rd Revised edition): Wai-Kai Chen Broadband Matching: Theory And Implementations (Third Edition) (Hardcover, 3rd Revised edition)
Wai-Kai Chen
R3,369 Discovery Miles 33 690 Ships in 12 - 19 working days

The third edition presents a unified, up-to-date and detailed account of broadband matching theory and its applications to the design of broadband matching networks and amplifiers. A special feature is the addition of results that are of direct practical value. They are design curves, tables and explicit formulas for designing networks having Butterworth, Chebyshev or elliptic, Bessel or maximally flat group-delay response. These results are extremely useful as the design procedures can be reduced to simple arithmetic. Two case studies towards the end of the book are intended to demonstrate the applications to the practical design of modern filter circuits.

Advances on Broad-Band Wireless Computing, Communication and Applications - Proceedings of the 12th International Conference on... Advances on Broad-Band Wireless Computing, Communication and Applications - Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2017) (Paperback, 1st ed. 2018)
Leonard Barolli, Fatos Xhafa, Jordi Conesa
R5,851 Discovery Miles 58 510 Ships in 10 - 15 working days

This book gathers the Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, held on November 8-10, 2017 in Barcelona, Spain. Information networking is currently undergoing a rapid evolution. Different kinds of networks with different characteristics are emerging and being integrated in heterogeneous networks. As a result, there are many interconnected problems that can occur at different levels of the hardware and software design of communicating entities and communication networks. These networks are expected to manage increasing usage demand, provide support for a significant number of services, guarantee Quality of Service (QoS), and optimize the use of network resources. The success of all-IP networking and wireless technology has changed the lifestyles of people around the world, and advances in electronic integration and wireless communications will pave the way to providing access to wireless networks on the fly, as electronic devices can increasingly exchange information with each other virtually anytime and anywhere. The aim of this book is to provide the latest findings, methods and development techniques from both theoretical and practical perspectives regarding the emerging areas of broad-band and wireless computing.

Mobile Ad Hoc Network Protocols Based on Dissimilarity Metrics (Paperback, 1st ed. 2017): M. Gunes, D. G. Reina, J. M. Garcia... Mobile Ad Hoc Network Protocols Based on Dissimilarity Metrics (Paperback, 1st ed. 2017)
M. Gunes, D. G. Reina, J. M. Garcia Campos, S. L. Toral
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This SpringerBrief presents the design and performance evaluation of communication protocols based on dissimilarity metrics for wireless multihop networks. Dissimilarity metrics are used to infer the network topology based solely on local information to efficiently disseminate packets throughout the network, reducing both redundancy and congestion which is covered in this brief. The performance evaluation of the proposed communication protocols has been conducted by both meticulous simulation and real experimentation in a wireless multi-hop testbed. The obtained results in this brief corroborate the hypothesis regarding the validity of dissimilarity metrics, which can be used to design efficient communication protocols. This SpringerBrief is a good starting point for advanced-level students studying computer science and electrical engineering, as well as researchers and professionals working in this field.

Mobile Ad-hoc and Sensor Networks - 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised... Mobile Ad-hoc and Sensor Networks - 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Liehuang Zhu, Sheng Zhong
R1,592 Discovery Miles 15 920 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017, held in Beijing, China, in December 2017. The 39 revised full papers presented were carefully reviewed and selected from 145 submissions. The papers address issues such as multi-hop wireless networks and wireless mesh networks; sensor and actuator networks; vehicle ad hoc networks; mobile social network; delay tolerant networks and opportunistic networking; cyber-physical systems; internet of things; system modeling and performance analysis; routing and network protocols; data transport and management in mobile networks; resource management and wireless QoS provisioning; security and privacy; cross layer design and optimization; novel applications and architectures.

Virtualized Wireless Networks - User Association and Resource Allocation (Paperback, 1st ed. 2018): Tho Le-Ngoc, Rajesh Dawadi,... Virtualized Wireless Networks - User Association and Resource Allocation (Paperback, 1st ed. 2018)
Tho Le-Ngoc, Rajesh Dawadi, Saeedeh Parsaeefard, Mahsa Derakhshani
R1,802 Discovery Miles 18 020 Ships in 10 - 15 working days

There have been recent advancements in wireless network technologies such as wireless virtualization to accommodate the exponential growth in demand, as well as to increase energy and infrastructure efficiencies. This SpringerBrief discusses the user-association and resource-allocation aspects in Virtualized Wireless Networks (VWNs) and highlights key technology innovations to meet their requirements. Various issues in practical implementation of VWNs are discussed along with potential techniques such as Massive MIMO, Cloud-Radio Access Network (C-RAN), and non-orthogonal multiple access (NOMA). This SpringerBrief will target researchers and professionals working on current and next-generation wireless networks. The content is also valuable for advanced-level students interested in wireless communications and signal processing for communications.

Advances in Network Systems - Architectures, Security, and Applications (Paperback, 1st ed. 2017): Maciej Grzenda, Ali Ismail... Advances in Network Systems - Architectures, Security, and Applications (Paperback, 1st ed. 2017)
Maciej Grzenda, Ali Ismail Awad, Janusz Furtak, Jaroslaw Legierski
R5,341 Discovery Miles 53 410 Ships in 10 - 15 working days

This book provides the reader with a comprehensive selection of cutting-edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems.

Radio Frequency Channel Coding Made Easy (Paperback, 1st ed. 2016): Saleh Faruque Radio Frequency Channel Coding Made Easy (Paperback, 1st ed. 2016)
Saleh Faruque
R2,117 Discovery Miles 21 170 Ships in 10 - 15 working days

This book introduces Radio Frequency Channel Coding to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications. The presentation is designed to be easily accessible, minimizing mathematics and maximizing visuals.

Mobile Technologies as a Health Care Tool (Paperback, 1st ed. 2016): Pelin Arslan Mobile Technologies as a Health Care Tool (Paperback, 1st ed. 2016)
Pelin Arslan
R1,860 Discovery Miles 18 600 Ships in 10 - 15 working days

This book presents a state-of-the-art overview of the available and emerging mobile technologies and explores how these technologies can serve as support tools in enhancing user participation in health care and promoting well-being in the daily lives of individuals, thereby reducing the burden of chronic disease on the health care system. The analysis is supported by presentation of a variety of case studies on the ways in which mobile technologies can be used to increase connectivity with health care providers and relevant others in order to promote healthy lifestyles and improve service provision. Detailed information is also provided on a sample project in which a set of tools has been used by teens at risk of obesity to record their sociopsychological environment and everyday health routines. Specifically, it is evaluated whether video diaries, created using a mobile platform and shared in real time via a social network, assist subjects in confronting obesity as a chronic disease. The book will be of interest to all who wish to understand the impressive potential of mobile health or to conduct research in the field.

HTTP (Paperback, With Marjorie Sayer, Sailu Reddy, Anshu Aggarwal September 2002): David Gourley HTTP (Paperback, With Marjorie Sayer, Sailu Reddy, Anshu Aggarwal September 2002)
David Gourley
R1,575 R1,164 Discovery Miles 11 640 Save R411 (26%) Ships in 12 - 19 working days

Web technology has become the foundation for all sorts of critical networked applications and far-reaching methods of data exchange, and beneath it all is a fundamental protocol: HyperText Transfer Protocol, or HTTP.

HTTP: The Definitive Guide documents everything that technical people need for using HTTP efficiently. A reader can understand how web applications work, how the core Internet protocols and architectural building blocks interact, and how to correctly implement Internet clients and servers.

Cisco ISE for BYOD and Secure Unified Access (Paperback, 2nd edition): Aaron Woland, Jamey Heary Cisco ISE for BYOD and Secure Unified Access (Paperback, 2nd edition)
Aaron Woland, Jamey Heary
R1,612 R1,490 Discovery Miles 14 900 Save R122 (8%) Ships in 12 - 19 working days

Fully updated: The complete guide to Cisco Identity Services Engine solutions Using Cisco Secure Access Architecture and Cisco Identity Services Engine, you can secure and gain control of access to your networks in a Bring Your Own Device (BYOD) world. This second edition of Cisco ISE for BYOD and Secure Unified Accesscontains more than eight brand-new chapters as well as extensively updated coverage of all the previous topics in the first edition book to reflect the latest technologies, features, and best practices of the ISE solution. It begins by reviewing today's business case for identity solutions. Next, you walk through ISE foundational topics and ISE design. Then you explore how to build an access security policy using the building blocks of ISE. Next are the in-depth and advanced ISE configuration sections, followed by the troubleshooting and monitoring chapters. Finally, we go in depth on the new TACACS+ device administration solution that is new to ISE and to this second edition. With this book, you will gain an understanding of ISE configuration, such as identifying users, devices, and security posture; learn about Cisco Secure Access solutions; and master advanced techniques for securing access to networks, from dynamic segmentation to guest access and everything in between. Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors offer in-depth coverage of the complete lifecycle for all relevant ISE solutions, making this book a cornerstone resource whether you're an architect, engineer, operator, or IT manager. * Review evolving security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT * Understand Cisco Secure Access, the Identity Services Engine (ISE), and the building blocks of complete solutions * Design an ISE-enabled network, plan/distribute ISE functions, and prepare for rollout * Build context-aware security policies for network access, devices, accounting, and audit * Configure device profiles, visibility, endpoint posture assessments, and guest services * Implement secure guest lifecycle management, from WebAuth to sponsored guest access * Configure ISE, network access devices, and supplicants, step by step * Apply best practices to avoid the pitfalls of BYOD secure access * Set up efficient distributed ISE deployments * Provide remote access VPNs with ASA and Cisco ISE * Simplify administration with self-service onboarding and registration * Deploy security group access with Cisco TrustSec * Prepare for high availability and disaster scenarios * Implement passive identities via ISE-PIC and EZ Connect * Implement TACACS+ using ISE * Monitor, maintain, and troubleshoot ISE and your entire Secure Access system * Administer device AAA with Cisco IOS, WLC, and Nexus

OSPF: A Network Routing Protocol (Paperback, 1st ed.): Phani Raj Tadimety OSPF: A Network Routing Protocol (Paperback, 1st ed.)
Phani Raj Tadimety
R1,585 Discovery Miles 15 850 Ships in 10 - 15 working days

Learn how routers network using the OSPF (Open Shortest Path First) protocol and unpick Dijkstra's Network Algorithm to see how OSPF performs the calculations to determine the shortest or most appropriate path between two routers. OSPF: A Network Routing Protocol dives deep into the OSPF protocol without sacrificing simplicity in language. All of this is done with running examples and illustrations to clarify concepts and enhance the enjoyment of networking. OSPF: A Network Routing Protocol is an absorbing, comprehensible account of OSPF, including the algorithm which is used for calculating its routes. While OSPF has traditionally been an organizational networking protocol, in these exciting times of Software Defined Networking (SDN), it has assumed an important role in the consolidated data center too. Now that the traditional distinctions between server and network roles are getting blurred, everyone in the data center needs to become familiar with networking and networking protocols!

Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications (Paperback, 1st ed. 2015): Zhou Lu,... Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications (Paperback, 1st ed. 2015)
Zhou Lu, Wenye Wang, Cliff Wang
R1,848 Discovery Miles 18 480 Ships in 10 - 15 working days

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.

Anti-Jamming Transmissions in Cognitive Radio Networks (Paperback, 1st ed. 2015): Liang Xiao Anti-Jamming Transmissions in Cognitive Radio Networks (Paperback, 1st ed. 2015)
Liang Xiao
R1,711 Discovery Miles 17 110 Ships in 10 - 15 working days

This SpringerBrief examines anti-jamming transmissions in cognitive radio networks (CRNs), including several recent related research topics within this field. The author introduces the transmissions based on uncoordinated spread spectrum to address smart jammers in CRNs. The author applies game theory to investigate the interactions between secondary users and jammers while providing game theoretic solutions to suppress jamming incentives in CRNs. Later chapters evaluate the Nash equilibrium and Stackelberg equilibrium of the jamming games under various network scenarios. Professionals and researchers working in networks, wireless communications and information technology will find Anti-Jamming Transmissions in Cognitive Radio Networks valuable material as a reference. Advanced-level students studying electrical engineering and computer science will also find this brief a useful tool.

Compressive Sensing for Wireless Communication: Challenges and Opportunities (Hardcover): Radha Sankararajan, Hemalatha... Compressive Sensing for Wireless Communication: Challenges and Opportunities (Hardcover)
Radha Sankararajan, Hemalatha Rajendran, Aasha Nandhini Sukumaran
R2,612 Discovery Miles 26 120 Ships in 12 - 19 working days

Compressed Sensing (CS) is a promising method that recovers the sparse and compressible signals from severely under-sampled measurements. CS can be applied to wireless communication to enhance its capabilities. As this technology is proliferating, it is possible to explore its need and benefits for emerging applicationsCompressive Sensing for Wireless Communication provides:* A clear insight into the basics of compressed sensing* A thorough exploration of applying CS to audio, image and computer vision* Different dimensions of applying CS in Cognitive radio networks* CS in wireless sensor network for spatial compression and projection* Real world problems/projects that can be implemented and tested* Efficient methods to sample and reconstruct the images in resource constrained WMSN environmentThis book provides the details of CS and its associated applications in a thorough manner. It lays a direction for students and new engineers and prepares them for developing new tasks within the field of CS. It is an indispensable companion for practicing engineers who wish to learn about the emerging areas of interest.

Resilient Wireless Sensor Networks - The Case of Network Coding (Paperback, 1st ed. 2015): Osameh Al-Kofahi, Ahmed E. Kamal Resilient Wireless Sensor Networks - The Case of Network Coding (Paperback, 1st ed. 2015)
Osameh Al-Kofahi, Ahmed E. Kamal
R1,699 Discovery Miles 16 990 Ships in 10 - 15 working days

This Springer Brief introduces wireless sensor networks (WSNs) and the need for resilient WSN operations in application domains. It presents traditional approaches of providing resilient operation of WSNs to ensure continuity of data delivery even when some network sensors fail. The pros and cons of each these approaches are discussed. Also included is an overview of network coding basics, and motivate the use of network coding-based protection in order to combine the advantages, but avoid the disadvantages of the traditional approaches. The authors cover the design and analysis of a centralized approach to network coding-based protection of WSNs. The coverage also includes practical and realistic network situations, and the coding strategies employed. Next discussed is how to recover from data losses using a distributed approach, which is more practical for large scale WSNs. Algorithms for scheduling of transmissions while implementing network coding-based in the two cases of using digital network coding, and analog network coding are covered. Resilient Wireless Sensor Networks includes a concise, but an in-depth coverage of the use of network coding to implement agile and resource efficient protection in WSNs. It will be of interest to professionals and researchers working in the areas of fault tolerance, network coding, and deployment of WSNs in harsh environment. Advanced-level students in electrical engineering and computer science will also find this research valuable as a reference.

Cognitive Radio Oriented Wireless Networks - 10th International Conference, CROWNCOM 2015, Doha, Qatar, April 21-23, 2015,... Cognitive Radio Oriented Wireless Networks - 10th International Conference, CROWNCOM 2015, Doha, Qatar, April 21-23, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Mark Weichold, Mounir Hamdi, Muhammad Zeeshan Shakir, Mohamed Abd Allah, George K. Karagiannidis, …
R1,672 Discovery Miles 16 720 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2015, held in Doha, Qatar, in April 2015. The 66 revised full papers presented were carefully reviewed and selected from 110 submissions and cover the evolution of cognitive radio technology pertaining to 5G networks. The papers are clustered to topics on dynamic spectrum access/management, networking protocols for CR, modeling and theory, HW architecture and implementations, next generation of cognitive networks, standards and business models, and emerging applications for cognitive networks.

Internet Protocol-based Emergency Services (Hardcover): H Tschofenig Internet Protocol-based Emergency Services (Hardcover)
H Tschofenig
R2,508 Discovery Miles 25 080 Ships in 12 - 19 working days

Written by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to routing and handling of IP-based emergency calls. Readers will learn how these standards work, how various standardization organizations contributed to them and about pilot projects, early deployment and current regulatory situation. Key Features: * Provides an overview of how the standards related to IP-based emergency services work, and how various organizations contributed to them * Focuses on SIP and IMS-based communication systems for the Internet * Covers standards, architecture and deployment issues * International focus, with coverage of the major national efforts in this area * Written by the experts who were/are involved in the development of the standards (NENA, EENA, 3GPP, IETF, ETSI, etc.) * Accompanying website provides updates on standards and deployment (http://ip-emergency.net) This book is an excellent resource for vendors building software and equipment for emergency services, engineers/researchers engaged in development of networks and network elements and standardization, emergency services providers, standardization experts, product persons, those within the regulatory environment. Students and lecturers, infrastructure and application service providers will also find this book of interest.

4G: Deployment Strategies and Operational Implications - Managing Critical Decisions in Deployment of 4G/LTE Networks and their... 4G: Deployment Strategies and Operational Implications - Managing Critical Decisions in Deployment of 4G/LTE Networks and their Effects on Network Operations and Business (Paperback, 1st ed.)
Trichy Venkataraman Krishnamurthy, Rajaneesh Shetty
R1,585 R1,446 Discovery Miles 14 460 Save R139 (9%) Ships in 10 - 15 working days

As telecommunications operators and network engineers understand, specific operational requirements drive early network architectural and design decisions for 4G networks. But they also know that because technology, standards, usage practices, and regulatory regimes change on a continuous basis, so do best practices. 4G: Deployment Strategies and Operational Implications helps you stay up to date by providing the latest innovative and strategic thinking on 4G and LTE deployments. It evaluates specific design and deployment options in depth and offers roadmap evolution strategies for LTE network business development. Fortunately, as you'll discover in this book, LTE is a robust and flexible standard for 4G communications. Operators developing 4G deployment strategies have many options, but they must consider the tradeoffs among them in order to maximize the return on investment for LTE networks. This book will show operators how to develop detailed but flexible deployment road maps incorporating business requirements while allowing the agility that expected and unexpected network evolution require. Such road maps help you avoid costly redeployment while leveraging profitable traffic. Telecommunications experts and authors Trichy Venkataraman Krishnamurthy and Rajaneesh Shetty examine various architectural options provided by the flexibility of LTE and their effect on the general current and future capability of the designed network. They examine specific features of the network, while covering specific architectural deployment strategies through example and then assessing their implications on both near- and long-term operations as well as potential evolutionary paths. Besides helping you understand and communicate network upgrade and architectural evolution road maps (with options), you will learn: How to plan for accessibility, retainability, integrity, availability, and mobility How to balance loads effectively How to manage the constraints arising from regulation and standardization How to manage the many disruptive factors affecting LTE networks 4G: Deployment Strategies and Operational Implications also outlines specific network strategies, which network features and deployment strategies support those strategies, and the trade-offs in business models depending on the strategies chosen. Best of all you will learn a process for proactive management of network road map evolution, ensuring that your network-and your skills-remain robust and relevant as the telecommunications landscape changes.

Guide to Voice and Video over IP - For Fixed and Mobile Networks (Paperback, 2013 ed.): Lingfen Sun, Is-Haka Mkwawa, Emmanuel... Guide to Voice and Video over IP - For Fixed and Mobile Networks (Paperback, 2013 ed.)
Lingfen Sun, Is-Haka Mkwawa, Emmanuel Jammeh, Emmanuel Ifeachor
R2,653 Discovery Miles 26 530 Ships in 10 - 15 working days

This book presents a review of the latest advances in speech and video compression, computer networking protocols, the assessment and monitoring of VoIP quality, and next generation network architectures for multimedia services. The book also concludes with three case studies, each presenting easy-to-follow step-by-step instructions together with challenging hands-on exercises. Features: provides illustrative worked examples and end-of-chapter problems; examines speech and video compression techniques, together with speech and video compression standards; describes the media transport protocols RTP and RTCP, as well as the VoIP signalling protocols SIP and SDP; discusses the concepts of VoIP quality of service and quality of experience; reviews next-generation networks based on the IP multimedia subsystem and mobile VoIP; presents case studies on building a VoIP system based on Asterisk, setting up a mobile VoIP system based on Open IMS and Android mobile, and analysing VoIP protocols and quality.

BGP - Building Reliable Networks with Border Gateway Protocol (Paperback, 1st ed): Iijitsch Van Beijnum BGP - Building Reliable Networks with Border Gateway Protocol (Paperback, 1st ed)
Iijitsch Van Beijnum
R959 R737 Discovery Miles 7 370 Save R222 (23%) Ships in 12 - 19 working days

This book is a guide to all aspects of BGP: the protocol, its configuration and operation in an Internet environment, and how to troubleshoot it. The book also describes how to secure BGP, and how BGP can be used as a tool in combating Distributed Denial of Service (DDoS) attacks. Although the examples throughout this book are for Cisco routers, the techniques discussed can be applied to any BGP-capable router.

Sketch-based Interfaces and Modeling (Paperback, 2011 ed.): Joaquim Jorge, Faramarz Samavati Sketch-based Interfaces and Modeling (Paperback, 2011 ed.)
Joaquim Jorge, Faramarz Samavati
R4,384 Discovery Miles 43 840 Ships in 10 - 15 working days

The field of sketch-based interfaces and modeling (SBIM) is concerned with developing methods and techniques to enable users to interact with a computer through sketching - a simple, yet highly expressive medium. SBIM blends concepts from computer graphics, human-computer interaction, artificial intelligence, and machine learning. Recent improvements in hardware, coupled with new machine learning techniques for more accurate recognition, and more robust depth inferencing techniques for sketch-based modeling, have resulted in an explosion of both sketch-based interfaces and pen-based computing devices. Presenting the first coherent, unified overview of SBIM, this unique text/reference bridges the two complementary research areas of user interaction (sketch-based interfaces), and graphical modeling and construction (sketch-based modeling). The book discusses the state of the art of this rapidly evolving field, with contributions from an international selection of experts. Also covered are sketch-based systems that allow the user to manipulate and edit existing data - from text, images, 3D shapes, and video - as opposed to modeling from scratch. Topics and features: reviews pen/stylus interfaces to graphical applications that avoid reliance on user interface modes; describes systems for diagrammatic sketch recognition, mathematical sketching, and sketch-based retrieval of vector drawings; examines pen-based user interfaces for engineering and educational applications; presents a set of techniques for sketch recognition that rely strictly on spatial information; introduces the Teddy system; a pioneering sketching interface for designing free-form 3D models; investigates a range of advanced sketch-based systems for modeling and designing 3D objects, including complex contours, clothing, and hair-styles; explores methods for modeling from just a single sketch or using only a few strokes. This text is an essential resource for researchers, practitioners and graduate students involved in human-factors and user interfaces, interactive computer graphics, and intelligent user interfaces and AI.

Broadband Wireless Access (Paperback, Softcover reprint of the original 1st ed. 2002): Benny Bing Broadband Wireless Access (Paperback, Softcover reprint of the original 1st ed. 2002)
Benny Bing
R4,346 Discovery Miles 43 460 Ships in 10 - 15 working days

This chapter has discussed how a commonbroadcast medium can be shared among many contending users. Multiple access protocols differ primarily by the amount of coordination needed to control potentially conflicting packet transmissions. Ato neextreme is random access where no coordinationis provideda ndp acket collisions arep ossible. Atthe other endo fthe spectrum, the class of fixed assignment access protocols eliminates collisions entirely butpay the price ofadditional overhead required forscheduling user access. Hybrid access protocolsb etweenthese two extremes exist While these protocols attempt to combine the advantages ofrandom andfixed access, they also suffer the c ombined drawbacks and overhead ofboth classes of access schemes. Amongt he many factors that determine the performance ofa n access protocol include the propagation delay/packet transmission timeratio, the message arrival process, the types of feedback information available, the user population, and the ability of the user to sense the activities in the network. BIBLIOGRAPHY [ABRA93] Abramson, N. , Multiple Access Communications , IEEE Press, 1993. [BERT92] Bertsekas, D. and Gallager, R. , Data Networks , Prentice Hall, 1992. [CHOU83]Chou,W, ComputerCommunications Volume1:Principles , Prentice Hall, 1983. [CIDO87] Cidon, I. andSidi, M. , "Erasures and Noise in Splitting Multiple Access Algorithms", IEEE Transactions on Information Theory, Vol. 33, No. 1, January 1987, pp. 132 - 140. [CIDO88] Cidon, I, Kodesh, H. and Sidi, M. , "Erasure, Capture and Random Power Level Selectionin Multiple Access Systems", IEEE Transactions on Communications , Vol. 3 6,N o. 3,March 1988, pp. 263 - 271.

Practical IPv6 for Windows Administrators (Paperback, 1st ed.): Edward Horley Practical IPv6 for Windows Administrators (Paperback, 1st ed.)
Edward Horley
R2,657 Discovery Miles 26 570 Ships in 10 - 15 working days

Practical IPv6 for Windows Administrators is a handy guide to implementing IPv6 in a Microsoft Windows environment. This is the book you need if you are a Microsoft Windows Administrator confronted with IPv6 and in need of a quick resource to get up and going. The book covers the current state of IPv6 and its support in Microsoft Windows. It provides best-practices and other guidance toward successful implementation. Practical IPv6 for Windows Administrators is the fast reference you can look at to get something done quickly. It covers IPv6 addressing, management of IPv6 from Powershell, help on Advanced Firewall configuration, and use of IPv6 in Hyper-V and virtual networking environments. You'll find practical examples showing how IPv6 integrates with all the standard tools you use for IPv4 today, tools like DNS and DHCP. You'll also find insider knowledge on IPv6 that can help avert stumbling points on the road to deployment.* Provides a quick path from IPv4 expertise to IPv6 implementation * Gives best-practices specific to Windows on IPv6 and dual stack networks * Is chock full of practical examples showing how to manage IPv6 on Windows What you'll learn * Understand IPv6 addressing and how it works in Windows * Implement best practices involving IPv6 for Exchange, IIS, and SharePoint * Manage IPv6 from PowerShell and the Windows Advanced Firewall * Deploy IPv6 from virtual networking environments such as in Hyper-V * Integrate IPv6 into Windows Server functions such as DNS, DHC, and Active Directory * Take advantage of IPv6 transition technologies that are supported in Windows Who this book is for Practical IPv6 for Windows Administrators is ideal for those working with Microsoft Windows operating systems who need to implement IPv6. The book is is designed for Microsoft Windows Administrators, but is also useful for developers, network engineers, and storage administrators who are involved in the architecture of Windows solutions.

The Definitive Guide to HTML5 WebSocket (Paperback, 1st ed.): Vanessa Wang, Frank Salim, Peter Moskovits The Definitive Guide to HTML5 WebSocket (Paperback, 1st ed.)
Vanessa Wang, Frank Salim, Peter Moskovits
R2,295 Discovery Miles 22 950 Ships in 10 - 15 working days

The Definitive Guide to HTML5 WebSocket is the ultimate insider's WebSocket resource. This revolutionary new web technology enables you to harness the power of true real-time connectivity and build responsive, modern web applications. This book contains everything web developers and architects need to know about WebSocket. It discusses how WebSocket-based architectures provide a dramatic reduction in unnecessary network overhead and latency compared to older HTTP (Ajax) architectures, how to layer widely used protocols such as XMPP and STOMP on top of WebSocket, and how to secure WebSocket connections and deploy WebSocket-based applications to the enterprise. Build real-time web applications with HTML5. This book: Introduces you to the WebSocket API and protocol Describes and provides real-world examples of protocol communication over WebSocket Explains WebSocket security and enterprise deployment

Geographic Location in the Internet (Paperback, Softcover reprint of the original 1st ed. 2002): Behcet Sarikaya Geographic Location in the Internet (Paperback, Softcover reprint of the original 1st ed. 2002)
Behcet Sarikaya
R2,858 Discovery Miles 28 580 Ships in 10 - 15 working days

This text discusses how to find the location of mobile devices in the wireless Internet, specifically those that involve the determination of the geographic location of mobile devices. It offers exclusive coverage of the technical aspects of privacy such as linkability, anonymity and identity management.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
From Logistic Networks to Social…
Bourrieres Hardcover R3,765 Discovery Miles 37 650
A History of the Conceptions of Limits…
Florian 1859-1930 Cajori Hardcover R939 Discovery Miles 9 390
Managing Chaos - Digital Governance by…
Lisa Welchman Paperback R975 Discovery Miles 9 750
Neutrosophic Sets in Decision Analysis…
Mohamed Abdel-Basset, Florentin Smarandache Hardcover R7,203 Discovery Miles 72 030
Essays in Mathematics and its…
Themistocles M. Rassias, Panos M. Pardalos Hardcover R3,074 Discovery Miles 30 740
Advancing Information Management through…
Patricia Ordonez De Pablos, Hector Oscar Nigro, … Hardcover R5,263 Discovery Miles 52 630
Materials and Contact Characterisation…
S. Hernandez, J. De Hosson, … Hardcover R3,995 Discovery Miles 39 950
Come, Let's Play - Scenario-Based…
David Harel, Rami Marelly Hardcover R1,629 Discovery Miles 16 290
Computational Geometry For Ships
Horst Nowacki, M.I.G. Bloor, … Hardcover R2,549 Discovery Miles 25 490
Computational Advancement in…
Koushik Maharatna, Maitreyi Ray Kanjilal, … Hardcover R4,420 Discovery Miles 44 200

 

Partners