Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
From fundamental concepts and theories to implementation protocols and cutting-edge applications, the Handbook of Mobile Systems Applications and Services supplies a complete examination of the evolution of mobile services technologies. It examines service-oriented architecture (SOA) and explains why SOA and service oriented computing (SOC) will play key roles in the development of future mobile services. Investigating current service discovery frameworks, the book covers the basics of mobile services and applications developed in various contexts. The first section provides readers with the required background in mobile services architecture. Next, it details of middleware support for mobile services. The final section discusses security and applications of mobile services. Containing the contributions of leading researchers and academics from around the world, the book: Introduces a new location-based access control model Unveils a simple, yet powerful enhancement that enables Web services to locally manage workflow dependencies and handle messages resulting from multiple workflows Examines an event-based location aware query model that continuously aggregates data in specific areas around mobile sensors of interest Addresses the problem of location-based access control in the context of privacy protection Presents a layered architecture of context-aware middleware Considers the development of assistive technology solutions for the blind or visually impaired Discussing architecture for supporting multi-mode terminals in integrated heterogeneous wireless networks, this book addresses the network availability constraint to serve all mobile services originating from a single-user terminal. It examines QoS protocols and their enhancements in supporting user mobility. Analyzing mobile services security vulnerabilities, it details security design best practices that mobile service developers can use to improve the security of their mobile systems.
How do firms jointly develop open information infrastructures? To answer this question, this book draws on the results of a longitudinal research project covering the development of the pharmaceutical distribution industry in China from 2004 to 2012, focusing on the emergence and subsequent evolution of industry-wide information infrastructures. How do firms delimit areas of proprietary innovation in open innovation projects? How do firms coordinate, initiate, negotiate and implement the development of innovative infrastructures? How do processes and practices within firms enable and constrain such collective efforts? - This book provides answers to these questions and draws conclusions regarding the challenges and new capabilities that firms will need in a world in which participation in the building of open information infrastructures becomes a necessary task for commercial organizations.
Heterogeneous wireless networks (HWNs) provide flexible and diversified wireless network access (e.g., cellular, IEEE 802.11) by integrating cellular networks, wireless LANs, and ad hoc networks with the Internet. It has been emerging as a promising solution to offer a variety of exciting applications, anytime and anywhere. The flexibility and benefits of the HWN, for example, is to extend the service coverage of the existing cellular and WLAN infrastructure, to improve the communication throughput, and reduce packet transmission latency, based on availability of different types of radio network in the roaming area (cellular, WLAN, or others). In the study, we answer some fundamental questions in the design and deployment of a HWN. The first is how to effectively operate a mobile terminal in ad hoc mode to access the Internet through a cellular network, WLAN or other underlying wireless access networks. The second is how to design ubiquitous seamless mobility support for a roaming user, allowing ubiquitous and bi-directional Internet accessibility, connectivity, and mobility. Finally, it answers the questions that what is the security threats for a mobile terminal that is operating in the ad hoc mode, and how to provide information confidentiality for a continuously moving mobile terminal.
|
You may like...
|