0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (5)
  • -
Status
Brand

Showing 1 - 10 of 10 matches in All Departments

Wisdom Web of Things (Hardcover, 1st ed. 2016): Ning Zhong, Jianhua Ma, Jiming Liu, Runhe Huang, Xiaohui Tao Wisdom Web of Things (Hardcover, 1st ed. 2016)
Ning Zhong, Jianhua Ma, Jiming Liu, Runhe Huang, Xiaohui Tao
R3,454 Discovery Miles 34 540 Ships in 12 - 17 working days

This book provides a thorough overview of the Wisdom Web of Things (W2T), a holistic framework for computing and intelligence in an emerging hyper-world with a social-cyber-physical space. Fast-evolving Web intelligence research and development initiatives are now moving toward understanding the multifaceted nature of intelligence and incorporating it at the Web scale in a ubiquitous environment with data, connection and service explosion. The book focuses on the framework and methodology of W2T, as well as its applications in different problem domains, such as intelligent businesses, urban computing, social computing, brain informatics and healthcare. From the researcher and developer perspectives, the book takes a systematic, structured view of various W2T facets and their overall contribution to the development of W2T as a whole. Written by leading international researchers, this book is an essential reference for researchers, educators, professionals, and tertiary HDR students working on the World Wide Web, ubiquitous computing, knowledge management, and business intelligence.

Device-Edge-Cloud Continuum - Paradigms, Architectures and Applications (1st ed. 2024): Claudio Savaglio, Giancarlo Fortino,... Device-Edge-Cloud Continuum - Paradigms, Architectures and Applications (1st ed. 2024)
Claudio Savaglio, Giancarlo Fortino, MengChu Zhou, Jianhua Ma
R3,740 Discovery Miles 37 400 Ships in 12 - 17 working days

This book focuses on both theoretical and practical aspects of the “Device-Edge-Cloud continuum”, a development approach aimed at the seamless provision of next-generation cyber-physical services through the dynamic orchestration of heterogeneous computing resources, located at different distances to the user and featured by different peculiarities (high responsiveness, high computing power, etc.). The book specifically explores recent advances in paradigms, architectures, models, and applications for the “Device-Edge-Cloud continuum”, which raises many 'in-the-small' and 'in-the-large' issues involving device programming, system architectures and methods for the development of IoT ecosystem. In this direction, the contributions presented in the book propose original solutions and aim at relevant domains spanning from healthcare to industry, agriculture and transportation.

Mobile Social Networking and Computing - A Multidisciplinary Integrated Perspective (Hardcover): Yufeng Wang, Jianhua Ma Mobile Social Networking and Computing - A Multidisciplinary Integrated Perspective (Hardcover)
Yufeng Wang, Jianhua Ma
R2,933 Discovery Miles 29 330 Ships in 12 - 17 working days

Recent advancements in mobile device technologies are revolutionizing how we socialize, interact, and connect. By connecting the virtual community with the local environment, mobile social networks (MSNs) create the opportunity for a multitude of new personalized services for mobile users. Along with that comes the need for new paradigms, mechanisms, and techniques with the capacity to autonomously manage their functioning and evolution. Currently, most books about mobile networks focus mainly on the technical point of view. Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspective not only addresses the theoretical aspects of MSN and computing, but also introduces and categorizes existing applications. It supplies a multidisciplinary perspective that considers the technology, economics, social sciences, and psychology behind MSNs. In addition to fundamental theory, the book investigates the practical issues in MSN, including characteristics, inner structural relationship, incentive mechanisms, resource allocating, information diffusion, search, ranking, privacy, trust, and reputation. Introducing recently developed technologies, modes, and models, the book provides two distinct (but related) viewpoints about MSN applications: socially inspired networking technology and networking technology that uses recent advancements to enhance quality of life. The text illustrates the interaction between the macrolevel structure and the local rational behaviors (microlevel) in MSN. It summarizes currently available MSN development platforms, including Android and iOS, and introduces and categorizes existing applications related to MSN and computing. Both location-based service (LBS) and mobile social networks in proximity (MSNPs) are presented in a comprehensive manner. Highlighting key research opportunities, this much-needed reference outlines incentive mechanisms inspired by classical economics, behavioral economics, and social psychology, and, perhaps for the first time, it presents a summary of the economic and business models of MSNs.

Wisdom Web of Things (Paperback, Softcover reprint of the original 1st ed. 2016): Ning Zhong, Jianhua Ma, Jiming Liu, Runhe... Wisdom Web of Things (Paperback, Softcover reprint of the original 1st ed. 2016)
Ning Zhong, Jianhua Ma, Jiming Liu, Runhe Huang, Xiaohui Tao
R3,793 Discovery Miles 37 930 Ships in 10 - 15 working days

This book provides a thorough overview of the Wisdom Web of Things (W2T), a holistic framework for computing and intelligence in an emerging hyper-world with a social-cyber-physical space. Fast-evolving Web intelligence research and development initiatives are now moving toward understanding the multifaceted nature of intelligence and incorporating it at the Web scale in a ubiquitous environment with data, connection and service explosion. The book focuses on the framework and methodology of W2T, as well as its applications in different problem domains, such as intelligent businesses, urban computing, social computing, brain informatics and healthcare. From the researcher and developer perspectives, the book takes a systematic, structured view of various W2T facets and their overall contribution to the development of W2T as a whole. Written by leading international researchers, this book is an essential reference for researchers, educators, professionals, and tertiary HDR students working on the World Wide Web, ubiquitous computing, knowledge management, and business intelligence.

Intelligent Computing Theories and Applications - 8th International Conference, ICIC 2012, Huangshan, China, July 25-29, 2012,... Intelligent Computing Theories and Applications - 8th International Conference, ICIC 2012, Huangshan, China, July 25-29, 2012, Proceedings (Paperback, 2012 ed.)
De-shuang Huang, Jianhua Ma, Kang-Hyun Jo, M.Michael Gromiha
R1,590 Discovery Miles 15 900 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Intelligent Computing, ICIC 2012, held in Huangshan, China, in July 2012. The 85 revised full papers presented were carefully reviewed and selected from 753 submissions. The papers are organized in topical sections on neural networks, evolutionar learning and genetic algorithms, granular computing and rough sets, biology inspired computing and optimization, nature inspired computing and optimization, cognitive science and computational neuroscience, knowledge discovery and data mining, quantum computing, machine learning theory and methods, healthcare informatics theory and methods, biomedical informatics theory and methods, complex systems theory and methods, intelligent computing in signal processing, intelligent computing in image processing, intelligent computing in robotics, intelligent computing in computer vision, intelligent agent and web applications, special session on advances in information security 2012.

Ubiquitous Intelligence and Computing - 8th International Conference, UIC 2011, Banff, Canada, September 2-4, 2011, Proceedings... Ubiquitous Intelligence and Computing - 8th International Conference, UIC 2011, Banff, Canada, September 2-4, 2011, Proceedings (Paperback, Edition.)
Ching-Hsien Hsu, Laurence T. Yang, Jianhua Ma, Chunsheng Zhu
R1,562 Discovery Miles 15 620 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Ubiquitous Intelligence and Computing, UIC 2010, held in Banff, Canada, September 2011.
The 44 papers presented together with two keynote speeches were carefully reviewed and selected from numerous submissions. The papers address all current issues in smart systems and services, smart objects and environments, cloud and services computing, security, privacy and trustworthy, P2P, WSN and ad hoc networks, and ubiquitous intelligent algorithms and applications.

Unlicensed Mobile Access Technology - Protocols, Architectures, Security, Standards and Applications (Paperback): Yan Zhang,... Unlicensed Mobile Access Technology - Protocols, Architectures, Security, Standards and Applications (Paperback)
Yan Zhang, Laurence T. Yang, Jianhua Ma
R1,717 Discovery Miles 17 170 Ships in 12 - 17 working days

The goal of Unlicensed Mobile Access (UMA) is to provide seamless access to GSM and GPRS mobile service networks via unlicensed spectrum technologies, including Bluetooth, WiMAX, and Wi-Fi. Expanding on the level of knowledge in this growing field, Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards, and Applications presents the first complete cross-referenced resource exploring UMA and UMA-relevant technologies. When operating successfully, the technology supporting dual-mode enabled mobile terminals allows subscribers to roam freely and seamlessly between cellular networks. However, various technical challenges still occasionally impede clear communication. This book explores the complex issue of mobility management and emphasizes the need for intelligently designed vertical and horizontal handoff algorithms that will improve adaptability in heterogeneous wireless environments. In addition, it reviews the various strategies to guarantee Quality-of-Service (QoS) during movement and handoff. The first chapters introduce the basic technology of these systems and discuss QoS, resource management, mobility management, and security issues in UMA technology. The middle section concentrates on protocols and security challenges in UMA-related technologies, which include Bluetooth, WirelessPAN, Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16). The final chapters present standard specifications and various applications. Comprised of contributions from world-wide experts, this book is a complete reference, offering guidance on all aspects of the technical and practical issues in UMA technology.

U- and E-Service, Science and Technology - International Conference, UNESST 2011, Held as Part of the Future Generation... U- and E-Service, Science and Technology - International Conference, UNESST 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings (Paperback, 2011)
Tai-Hoon Kim, Hojjat Adeli, Jianhua Ma, Wai-Chi Fang, Byeong Ho Kang, …
R1,489 Discovery Miles 14 890 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference, UNESST 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of u- and e-service, science and technology.

Computer Applications for Database, Education and Ubiquitous Computing - International Conferences, EL, DTA and UNESST 2012,... Computer Applications for Database, Education and Ubiquitous Computing - International Conferences, EL, DTA and UNESST 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings (Paperback, 2012 ed.)
Tai-Hoon Kim, Jianhua Ma, Wai-Chi Fang, Yanchun Zhang, Alfredo Cuzzocrea
R1,493 Discovery Miles 14 930 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the International Conferences, EL, DTA and UNESST 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Kangwondo, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of education and learning, database theory and application and u- and e-service, science and technology.

Unlicensed Mobile Access Technology - Protocols, Architectures, Security, Standards and Applications (Hardcover): Yan Zhang,... Unlicensed Mobile Access Technology - Protocols, Architectures, Security, Standards and Applications (Hardcover)
Yan Zhang, Laurence T. Yang, Jianhua Ma
R3,495 Discovery Miles 34 950 Ships in 12 - 17 working days

The goal of Unlicensed Mobile Access (UMA) is to provide seamless access to GSM and GPRS mobile service networks via unlicensed spectrum technologies, including Bluetooth, WiMAX, and Wi-Fi. Expanding on the level of knowledge in this growing field, Unlicensed Mobile Access Technology: "Protocols, Architectures, Security, Standards, and Applications" presents the first complete cross-referenced resource exploring UMA and UMA-relevant technologies.

When operating successfully, the technology supporting dual-mode enabled mobile terminals allows subscribers to roam freely and seamlessly between cellular networks. However, various technical challenges still occasionally impede clear communication. This book explores the complex issue of mobility management and emphasizes the need for intelligently designed vertical and horizontal handoff algorithms that will improve adaptability in heterogeneous wireless environments. In addition, it reviews the various strategies to guarantee Quality-of- Service (QoS) during movement and handoff.

The first chapters introduce the basic technology of these systems and discuss QoS, resource management, mobility management, and security issues in UMA technology. The middle section concentrates on protocols and security challenges in UMA-related technologies, which include Bluetooth, WirelessPAN, Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16). The final chapters present standard specifications and various applications.

Comprised of contributions from world-wide experts, this book is a complete reference, offering guidance on all aspects of the technical and practical issues in UMA technology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sylvanian Families - Walnut Squirrel…
R749 R579 Discovery Miles 5 790
Marvel Spiderman Fibre-Tip Markers (Pack…
R57 Discovery Miles 570
CoolKids Digital Mid-size 30M WR Watch…
R176 Discovery Miles 1 760
Bait - To Catch A Killer
Janine Lazarus Paperback R320 R275 Discovery Miles 2 750
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Cadac Pizza Stone (33cm)
 (18)
R398 Discovery Miles 3 980
Genuine Leather Wallet With Clip Closure…
R299 R246 Discovery Miles 2 460
Docking Edition Multi-Functional…
R899 R399 Discovery Miles 3 990
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100

 

Partners