0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 24 of 24 matches in All Departments

Mobile Crowdsourcing - From Theory to Practice (1st ed. 2023): Jie Wu, En Wang Mobile Crowdsourcing - From Theory to Practice (1st ed. 2023)
Jie Wu, En Wang
R4,929 Discovery Miles 49 290 Ships in 12 - 17 working days

This book offers the latest research results in recent development on the principles, techniques and applications in mobile crowdsourcing. It presents state-of-the-art content and provides an in-depth overview of the basic background in this related field. Crowdsourcing involves a large crowd of participants working together to contribute or produce goods and services for the society. The early 21st century applications of crowdsourcing can be called crowdsourcing 1.0, which includes businesses using crowdsourcing to accomplish various tasks, such as the ability to offload peak demand, access cheap labor, generate better results in a timely matter, and reach a wider array of talent outside the organization.  Mobile crowdsensing can be described as an extension of crowdsourcing to the mobile network to combine the idea of crowdsourcing with the sensing capacity of mobile devices. As a promising paradigm for completing complex sensing and computation tasks, mobile crowdsensing serves the vital purpose of exploiting the ubiquitous smart devices carried by mobile users to make conscious or unconscious collaboration through mobile networks. Considering that we are in the era of mobile internet, mobile crowdsensing is developing rapidly and has great advantages in deployment and maintenance, sensing range and granularity, reusability, and other aspects. Due to the benefits of using mobile crowdsensing, many emergent applications are now available for individuals, business enterprises, and governments. In addition, many new techniques have been developed and are being adopted. This book will be of value to researchers and students targeting this topic as a reference book.  Practitioners, government officials, business organizations and even customers -- working, participating or those interested in fields related to crowdsourcing will also want to purchase this book.

Business Innovation with New ICT in the Asia-Pacific: Case Studies (Hardcover, 1st ed. 2021): Michitaka Kosaka, Jie Wu, Ke... Business Innovation with New ICT in the Asia-Pacific: Case Studies (Hardcover, 1st ed. 2021)
Michitaka Kosaka, Jie Wu, Ke Xing, Shiyong Zhang
R3,577 Discovery Miles 35 770 Ships in 10 - 15 working days

This book clarifies the direction of business innovation using new ICT such as the Internet of things (IoT), artificial intelligence (AI), smartphones, and cloud computing through a series of case studies on successful trials and advanced businesses in the Asia-Pacific where many industry sectors have been growing successfully in the 21st century. ICT has been playing an important role in value creation for customers and in profit generation for providers, contributing to various service innovation and business innovation. Now, digitalization using IoT and AI provides solutions to address various issues in the human society, which is transforming services and businesses in the 21st century. "What is the direction of the business innovation using new ICT?" is a highly concerned question for business researchers and practitioners. Aiming to answer the question, this book conducts a number of cases studies in the Asia-Pacific region, including the Mainland China, Taiwan, Japan, Malaysia, Vietnam, as well as Australia. Among the studies, there are 4 cases from ICT providers, 4 cases from traditional and services, and 6 cases from new ICT applications and businesses. Each case analyzes social needs and human desires, new value created, roles of new technologies, processes and difficulties in developing new businesses, the relationship among customers, providers, and stakeholders, value chain co-creation and optimization, factors of success, and business models. Finally, the direction of business innovation with new ICT in the Asia-Pacific is suggested by summarizing the findings from the case studies through the lens of the theoretical analysis in service science.

Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021): Wei Chang, Jie Wu Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021)
Wei Chang, Jie Wu
R3,963 Discovery Miles 39 630 Ships in 12 - 17 working days

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Combinatorial And Toric Homotopy: Introductory Lectures (Hardcover): Alastair Darby, Jelena Grbic, Zhi Lu, Jie Wu Combinatorial And Toric Homotopy: Introductory Lectures (Hardcover)
Alastair Darby, Jelena Grbic, Zhi Lu, Jie Wu
R4,213 Discovery Miles 42 130 Ships in 10 - 15 working days

This volume consists of introductory lectures on the topics in the new and rapidly developing area of toric homotopy theory, and its applications to the current research in configuration spaces and braids, as well as to more applicable mathematics such as fr-codes and robot motion planning.The book starts intertwining homotopy theoretical and combinatorial ideas within the remits of toric topology and illustrates an attempt to classify in a combinatorial way polytopes known as fullerenes, which are important objects in quantum physics, quantum chemistry and nanotechnology. Toric homotopy theory is then introduced as a further development of toric topology, which describes properties of Davis-Januszkiewicz spaces, moment-angle complexes and their generalizations to polyhedral products. The book also displays the current research on configuration spaces, braids, the theory of limits over the category of presentations and the theory of fr-codes. As an application to robotics, the book surveys topological problems relevant to the motion planning problem of robotics and includes new results and constructions, which enrich the emerging area of topological robotics.The book is at research entry level addressing the core components in homotopy theory and their important applications in the sciences and thus suitable for advanced undergraduate and graduate students.

Distributed System Design (Paperback): Jie Wu Distributed System Design (Paperback)
Jie Wu
R1,755 Discovery Miles 17 550 Ships in 12 - 17 working days

Future requirements for computing speed, system reliability, and cost-effectiveness entail the development of alternative computers to replace the traditional von Neumann organization. As computing networks come into being, one of the latest dreams is now possible - distributed computing. Distributed computing brings transparent access to as much computer power and data as the user needs for accomplishing any given task - simultaneously achieving high performance and reliability. The subject of distributed computing is diverse, and many researchers are investigating various issues concerning the structure of hardware and the design of distributed software. Distributed System Design defines a distributed system as one that looks to its users like an ordinary system, but runs on a set of autonomous processing elements (PEs) where each PE has a separate physical memory space and the message transmission delay is not negligible. With close cooperation among these PEs, the system supports an arbitrary number of processes and dynamic extensions. Distributed System Design outlines the main motivations for building a distributed system, including: inherently distributed applications performance/cost resource sharing flexibility and extendibility availability and fault tolerance scalability Presenting basic concepts, problems, and possible solutions, this reference serves graduate students in distributed system design as well as computer professionals analyzing and designing distributed/open/parallel systems. Chapters discuss: the scope of distributed computing systems general distributed programming languages and a CSP-like distributed control description language (DCDL) expressing parallelism, interprocess communication and synchronization, and fault-tolerant design two approaches describing a distributed system: the time-space view and the interleaving view mutual exclusion and related issues, including election, bidding, and self-stabilization prevention and detection of deadlock reliability, safety, and security as well as various methods of handling node, communication, Byzantine, and software faults efficient interprocessor communication mechanisms as well as these mechanisms without specific constraints, such as adaptiveness, deadlock-freedom, and fault-tolerance virtual channels and virtual networks load distribution problems synchronization of access to shared data while supporting a high degree of concurrency

Braids: Introductory Lectures On Braids, Configurations And Their Applications (Hardcover): A. Jon Berrick, Fred Cohen,... Braids: Introductory Lectures On Braids, Configurations And Their Applications (Hardcover)
A. Jon Berrick, Fred Cohen, Elizabeth Hanbury, Yan-Loi Wong, Jie Wu
R3,757 Discovery Miles 37 570 Ships in 12 - 17 working days

This book is an indispensable guide for anyone seeking to familarize themselves with research in braid groups, configuration spaces and their applications. Starting at the beginning, and assuming only basic topology and group theory, the volume's noted expositors take the reader through the fundamental theory and on to current research and applications in fields as varied as astrophysics, cryptography and robotics. As leading researchers themselves, the authors write enthusiastically about their topics, and include many striking illustrations. The chapters have their origins in tutorials given at a Summer School on Braids, at the National University of Singapore's Institute for Mathematical Sciences in June 2007, to an audience of more than thirty international graduate students.

Distributed System Design (Hardcover): Jie Wu Distributed System Design (Hardcover)
Jie Wu
R4,063 Discovery Miles 40 630 Ships in 12 - 17 working days

Future requirements for computing speed, system reliability, and cost-effectiveness entail the development of alternative computers to replace the traditional von Neumann organization. As computing networks come into being, one of the latest dreams is now possible - distributed computing.
Distributed computing brings transparent access to as much computer power and data as the user needs for accomplishing any given task - simultaneously achieving high performance and reliability.
The subject of distributed computing is diverse, and many researchers are investigating various issues concerning the structure of hardware and the design of distributed software. Distributed System Design defines a distributed system as one that looks to its users like an ordinary system, but runs on a set of autonomous processing elements (PEs) where each PE has a separate physical memory space and the message transmission delay is not negligible. With close cooperation among these PEs, the system supports an arbitrary number of processes and dynamic extensions.
Distributed System Design outlines the main motivations for building a distributed system, including:
inherently distributed applications
performance/cost
resource sharing
flexibility and extendibility
availability and fault tolerance
scalability
Presenting basic concepts, problems, and possible solutions, this reference serves graduate students in distributed system design as well as computer professionals analyzing and designing distributed/open/parallel systems.
Chapters discuss:
the scope of distributed computing systems
general distributed programming languages and a CSP-like distributed control description language (DCDL)
expressing parallelism, interprocess communication and synchronization, and fault-tolerant design
two approaches describing a distributed system: the time-space view and the interleaving view
mutual exclusion and related issues, including election, bidding, and self-stabilization
prevention and detection of deadlock
reliability, safety, and security as well as various methods of handling node, communication, Byzantine, and software faults
efficient interprocessor communication mechanisms as well as these mechanisms without specific constraints, such as adaptiveness, deadlock-freedom, and fault-tolerance
virtual channels and virtual networks
load distribution problems
synchronization of access to shared data while supporting a high degree of concurrency

Opportunistic Mobile Social Networks (Hardcover): Jie Wu, Yunsheng Wang Opportunistic Mobile Social Networks (Hardcover)
Jie Wu, Yunsheng Wang
R3,791 Discovery Miles 37 910 Ships in 12 - 17 working days

The widespread availability of mobile devices along with recent advancements in networking capabilities make opportunistic mobile social networks (MSNs) one of the most promising technologies for next-generation mobile applications. Opportunistic Mobile Social Networks supplies a new perspective of these networks that can help you enhance spontaneous interaction and communication among users that opportunistically encounter each other, without additional infrastructure support.
The book explores recent developments in the theoretical, algorithmic, and application-based aspects of opportunistic MSNs. It presents the motivation behind opportunistic MSNs, describes their underpinning and key concepts, and also explores ongoing research.

  • Supplies a systematic study of the constrained information flow problem
  • Reviews the recent literature on social influence in complex social networks
  • Presents a complete overview of the fundamental characteristics of link-level connectivity in opportunistic networks
  • Explains how mobility and dynamic network structure impact the processing capacity of opportunistic MSNs for cloud applications
  • Provides a comprehensive overview of the routing schemes proposed in opportunistic MSNs

Taking an in-depth look at multicast protocols, the book explains how to provide pervasive data access to mobile users without the support of cellular or Internet infrastructures. Considering privacy and security issues, it surveys a collection of cutting-edge approaches for minimizing privacy leakage during opportunistic user profile exchange.
The book concludes by introducing a framework for mobile peer rating using a multi-dimensional metric scheme based on encounter and location testing. It also explains how to develop a network emulation test bed for validating the efficient operation of opportunistic network applications and protocols in scenarios that involve both node mobility and wireless communication.

Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks (Hardcover): Jie Wu Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks (Hardcover)
Jie Wu
R4,961 Discovery Miles 49 610 Ships in 12 - 17 working days

The availability of cheaper, faster, and more reliable electronic components has stimulated important advances in computing and communication technologies. Theoretical and algorithmic approaches that address key issues in sensor networks, ad hoc wireless networks, and peer-to-peer networks play a central role in the development of emerging network paradigms. Filling the need for a comprehensive reference on recent developments, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks explores two questions: What are the central technical issues in these SAP networks? What are the possible solutions/tools available to address these issues? The editor brings together information from different research disciplines to initiate a comprehensive technical discussion on theoretical and algorithmic approaches to three related fields: sensor networks, ad hoc wireless networks, and peer-to-peer networks. With chapters written by authorities from Motorola, Bell Lab, and Honeywell, the book examines the theoretical and algorithmic aspects of recent developments and highlights future research challenges. The book's coverage includes theoretical and algorithmic methods and tools such as optimization, computational geometry, graph theory, and combinatorics. Although many books have emerged recently in this area, none of them address all three fields in terms of common issues.

Fog/Edge Computing For Security, Privacy, and Applications (Paperback, 1st ed. 2021): Wei Chang, Jie Wu Fog/Edge Computing For Security, Privacy, and Applications (Paperback, 1st ed. 2021)
Wei Chang, Jie Wu
R4,267 Discovery Miles 42 670 Ships in 10 - 15 working days

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Business Innovation with New ICT in the Asia-Pacific: Case Studies (Paperback, 1st ed. 2021): Michitaka Kosaka, Jie Wu, Ke... Business Innovation with New ICT in the Asia-Pacific: Case Studies (Paperback, 1st ed. 2021)
Michitaka Kosaka, Jie Wu, Ke Xing, Shiyong Zhang
R3,547 Discovery Miles 35 470 Ships in 10 - 15 working days

This book clarifies the direction of business innovation using new ICT such as the Internet of things (IoT), artificial intelligence (AI), smartphones, and cloud computing through a series of case studies on successful trials and advanced businesses in the Asia-Pacific where many industry sectors have been growing successfully in the 21st century. ICT has been playing an important role in value creation for customers and in profit generation for providers, contributing to various service innovation and business innovation. Now, digitalization using IoT and AI provides solutions to address various issues in the human society, which is transforming services and businesses in the 21st century. "What is the direction of the business innovation using new ICT?" is a highly concerned question for business researchers and practitioners. Aiming to answer the question, this book conducts a number of cases studies in the Asia-Pacific region, including the Mainland China, Taiwan, Japan, Malaysia, Vietnam, as well as Australia. Among the studies, there are 4 cases from ICT providers, 4 cases from traditional and services, and 6 cases from new ICT applications and businesses. Each case analyzes social needs and human desires, new value created, roles of new technologies, processes and difficulties in developing new businesses, the relationship among customers, providers, and stakeholders, value chain co-creation and optimization, factors of success, and business models. Finally, the direction of business innovation with new ICT in the Asia-Pacific is suggested by summarizing the findings from the case studies through the lens of the theoretical analysis in service science.

Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks (Paperback): Jie Wu Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks (Paperback)
Jie Wu
R1,784 Discovery Miles 17 840 Ships in 12 - 17 working days

The availability of cheaper, faster, and more reliable electronic components has stimulated important advances in computing and communication technologies. Theoretical and algorithmic approaches that address key issues in sensor networks, ad hoc wireless networks, and peer-to-peer networks play a central role in the development of emerging network paradigms. Filling the need for a comprehensive reference on recent developments, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks explores two questions: What are the central technical issues in these SAP networks? What are the possible solutions/tools available to address these issues? The editor brings together information from different research disciplines to initiate a comprehensive technical discussion on theoretical and algorithmic approaches to three related fields: sensor networks, ad hoc wireless networks, and peer-to-peer networks. With chapters written by authorities from Motorola, Bell Lab, and Honeywell, the book examines the theoretical and algorithmic aspects of recent developments and highlights future research challenges. The book's coverage includes theoretical and algorithmic methods and tools such as optimization, computational geometry, graph theory, and combinatorics. Although many books have emerged recently in this area, none of them address all three fields in terms of common issues.

Sulfur Dioxide Insertion Reactions for Organic Synthesis (Paperback, 1st ed. 2017): Danqing Zheng, Jie Wu Sulfur Dioxide Insertion Reactions for Organic Synthesis (Paperback, 1st ed. 2017)
Danqing Zheng, Jie Wu
R1,670 Discovery Miles 16 700 Ships in 10 - 15 working days

This brief summarizes the most commonly used sulfur dioxide surrogates and also shows the diverse reactivities to highlight the advances made in the development of synthetic methods through the insertion of sulfur dioxide. Depending on the nature of the transformation, these reactions are classified into four types: (i) pericyclic reactions; (ii) nucleophilic addition with organometallic reagents; (iii) transition metal catalysis; and (iv) free radical reactions. Highlighting recent advances in the insertion of sulfur dioxide, providing detailed descriptions of the experimental procedures for these valuable reactions, and discussing the remaining challenges in this field, the brief offers an appealing and highly useful guide for a wide readership in organic chemistry and medicinal chemistry from both academia and industry.

Frontiers in Internet Technologies - Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014,... Frontiers in Internet Technologies - Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Shiyong Zhang, Ke Xu, Mingwei Xu, Jie Wu, Chengrong Wu, …
R1,426 Discovery Miles 14 260 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third CCF Internet Conference of China, ICoC 2014, held in Shanghai, China, in July 2014. The 10 revised full papers presented were carefully reviewed and selected from 94 submissions. The papers address issues such as software defined network, network security, future Internet architecture, Internet application, network management, network protocols and models, wireless and sensor networks.

Energy-aware Scheduling on Multiprocessor Platforms (Paperback, 2013 ed.): Dawei Li, Jie Wu Energy-aware Scheduling on Multiprocessor Platforms (Paperback, 2013 ed.)
Dawei Li, Jie Wu
R1,612 Discovery Miles 16 120 Ships in 10 - 15 working days

Multiprocessor platforms play important roles in modern computing systems, and appear in various applications, ranging from energy-limited hand-held devices to large data centers. As the performance requirements increase, energy-consumption in these systems also increases significantly. Dynamic Voltage and Frequency Scaling (DVFS), which allows processors to dynamically adjust the supply voltage and the clock frequency to operate on different power/energy levels, is considered an effective way to achieve the goal of energy-saving. This book surveys existing works that have been on energy-aware task scheduling on DVFS multiprocessor platforms. Energy-aware scheduling problems are intrinsically optimization problems, the formulations of which greatly depend on the platform and task models under consideration. Thus, Energy-aware Scheduling on Multiprocessor Platforms covers current research on this topic and classifies existing works according to two key standards, namely, homogeneity/heterogeneity of multi processor platforms and the task types considered. Under this classification, other sub-issues are also included, such as, slack reclamation, fixed/dynamic priority sched uling, partition-based/global scheduling, and application-specific power consumption, etc.

Opportunistic Mobile Social Networks (Paperback): Jie Wu, Yunsheng Wang Opportunistic Mobile Social Networks (Paperback)
Jie Wu, Yunsheng Wang
R1,805 Discovery Miles 18 050 Ships in 12 - 17 working days

The widespread availability of mobile devices along with recent advancements in networking capabilities make opportunistic mobile social networks (MSNs) one of the most promising technologies for next-generation mobile applications. Opportunistic Mobile Social Networks supplies a new perspective of these networks that can help you enhance spontaneous interaction and communication among users that opportunistically encounter each other, without additional infrastructure support. The book explores recent developments in the theoretical, algorithmic, and application-based aspects of opportunistic MSNs. It presents the motivation behind opportunistic MSNs, describes their underpinning and key concepts, and also explores ongoing research. Supplies a systematic study of the constrained information flow problem Reviews the recent literature on social influence in complex social networks Presents a complete overview of the fundamental characteristics of link-level connectivity in opportunistic networks Explains how mobility and dynamic network structure impact the processing capacity of opportunistic MSNs for cloud applications Provides a comprehensive overview of the routing schemes proposed in opportunistic MSNs Taking an in-depth look at multicast protocols, the book explains how to provide pervasive data access to mobile users without the support of cellular or Internet infrastructures. Considering privacy and security issues, it surveys a collection of cutting-edge approaches for minimizing privacy leakage during opportunistic user profile exchange. The book concludes by introducing a framework for mobile peer rating using a multi-dimensional metric scheme based on encounter and location testing. It also explains how to develop a network emulation test bed for validating the efficient operation of opportunistic network applications and protocols in scenarios that

Distributed Computing and Networking - 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010,... Distributed Computing and Networking - 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedings (Paperback, Edition.)
Krishna Kant, Sriram V. Pemmaraju, Krishna M. Sivalingam, Jie Wu
R2,861 Discovery Miles 28 610 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Networking, ICDCN 2010, held in Kolkata, India, during January 3-6, 2010.

There were 169 submissions, 96 to the networking track and 73 to the distributed computing track. After review the committee selected 23 papers for the networking and 21 for the distributed computing track. The topics addressed are network protocol and applications, fault-tolerance and security, sensor networks, distributed algorithms and optimization, peer-to-peer networks and network tracing, parallel and distributed systems, wireless networks, applications and distributed systems, optical, cellular and mobile ad hoc networks, and theory of distributed systems.

Mobile Ad-hoc and Sensor Networks - First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings... Mobile Ad-hoc and Sensor Networks - First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings (Paperback, 2005 ed.)
Xiaohua Jia, Jie Wu, Yanxiang He
R4,829 Discovery Miles 48 290 Ships in 10 - 15 working days

MSN 2005, the First International Conference on Mobile Ad-hoc and Sensor Networks, was held during 13-15 December 2005, in Wuhan, China. The conference provided a forum for researchers and practitioners to exchange research results and share development experiences. MSN 2005 attracted 512 submissions (including the submissions to the Modeling and Security in Next Generation Mobile Information Systems (MSNG) workshop), among which 100 papers were accepted for the conf- ence and 12 papers were accepted for the workshop. We would like to thank the International Program Committee for their valuable time and effort in reviewing the papers. Special thanks go to the conference PC Vi- chairs, Ivan Stojmenovic, Jang-Ping Sheu and Jianzhong Li for their help in ass- bling the International PC and coordinating the review process. We would also like to thank the Workshop Chair, Dongchun Lee, for organizing the workshop. We would like to express our gratitude to the invited speakers, Laxmi Bhuya, Lionel Ni and Taieb Znati, for their insightful speeches. Finally, we would like to thank the Local Organization Chair, Chuanhe Huang, for making all the local - rangements for the conference. December 2005 Xiaohua Jia Jie Wu Yanxiang He Organization Steering Co-chairs Lionel Ni, Hong Kong University of Science and Technology, HKSAR Jinnan Liu, Wuhan University, PRC General Co-chairs Taieb Znati, University of Pittsburgh, USA Yanxiang He, Wuhan University, PRC Program Co-chairs Jie Wu, Florida Atlantic University, USA Xiaohua Jia, City University of Hong Kong, HKSAR Program Vice Chairs

New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy (Hardcover): Jie Wu New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy (Hardcover)
Jie Wu
R5,613 Discovery Miles 56 130 Ships in 12 - 17 working days

The methodologies of aesthetic thought have always had a deep, historic foundation and serve as a staple of philosophy. Researchers have begun re-examining the structure and levels of aesthetics by tracing the history of this practice and studying European and Asian traditions. This systematic perspective is an emerging topic of exploration yet requires an appropriate level of research that further investigates the recent discoveries of systemic aesthetics in today's modern world. New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy is an essential reference source that discusses the organic connection between philosophy, mathematics, and aesthetics, as well as its application to other fields of human sciences. This book analyzes the history of aesthetics and studies the contemporary laws and function of beauty and nature. Featuring research on topics such as fundamental principles, mathematical methods, and humanistic logic, this book is ideally designed for philosophers, physicians, scientific researchers, mathematicians, systems engineers, complexity professionals, anthropologists, art designers, academicians, and students seeking coverage on the structure of artistic beauty through a systematic approach.

Creating Autonomous Vehicle Systems, Second Edition (Paperback, 2nd Revised edition): Liu Shaoshan, Li Li-yun, Tang Jie, Wu... Creating Autonomous Vehicle Systems, Second Edition (Paperback, 2nd Revised edition)
Liu Shaoshan, Li Li-yun, Tang Jie, Wu Shuang, Gaudiot Jean-Luc
R1,711 Discovery Miles 17 110 Ships in 10 - 15 working days

This book is one of the first technical overviews of autonomous vehicles written for a general computing and engineering audience. The authors share their practical experiences designing autonomous vehicle systems. These systems are complex, consisting of three major subsystems: (1) algorithms for localization, perception, and planning and control; (2) client systems, such as the robotics operating system and hardware platform; and (3) the cloud platform, which includes data storage, simulation, high-definition (HD) mapping, and deep learning model training. The algorithm subsystem extracts meaningful information from sensor raw data to understand its environment and make decisions as to its future actions. The client subsystem integrates these algorithms to meet real-time and reliability requirements. The cloud platform provides offline computing and storage capabilities for autonomous vehicles. Using the cloud platform, new algorithms can be tested so as to update the HD map-in addition to training better recognition, tracking, and decision models. Since the first edition of this book was released, many universities have adopted it in their autonomous driving classes, and the authors received many helpful comments and feedback from readers. Based on this, the second edition was improved by extending and rewriting multiple chapters and adding two commercial test case studies. In addition, a new section entitled "Teaching and Learning from this Book" was added to help instructors better utilize this book in their classes. The second edition captures the latest advances in autonomous driving and that it also presents usable real-world case studies to help readers better understand how to utilize their lessons in commercial autonomous driving projects. This book should be useful to students, researchers, and practitioners alike. Whether you are an undergraduate or a graduate student interested in autonomous driving, you will find herein a comprehensive overview of the whole autonomous vehicle technology stack. If you are an autonomous driving practitioner, the many practical techniques introduced in this book will be of interest to you. Researchers will also find extensive references for an effective, deeper exploration of the various technologies.

New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy (Paperback): Jie Wu New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy (Paperback)
Jie Wu
R4,365 Discovery Miles 43 650 Ships in 10 - 15 working days

The methodologies of aesthetic thought have always had a deep, historic foundation and serve as a staple of philosophy. Researchers have begun re-examining the structure and levels of aesthetics by tracing the history of this practice and studying European and Asian traditions. This systematic perspective is an emerging topic of exploration yet requires an appropriate level of research that further investigates the recent discoveries of systemic aesthetics in today's modern world. New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy is an essential reference source that discusses the organic connection between philosophy, mathematics, and aesthetics, as well as its application to other fields of human sciences. This book analyzes the history of aesthetics and studies the contemporary laws and function of beauty and nature. Featuring research on topics such as fundamental principles, mathematical methods, and humanistic logic, this book is ideally designed for philosophers, physicians, scientific researchers, mathematicians, systems engineers, complexity professionals, anthropologists, art designers, academicians, and students seeking coverage on the structure of artistic beauty through a systematic approach.

The New Progress in Cancer Treatment (Paperback): Xu Xu Bin Ze Jie Wu The New Progress in Cancer Treatment (Paperback)
Xu Xu Bin Ze Jie Wu
R911 Discovery Miles 9 110 Ships in 10 - 15 working days
Condense Wisdom and Conquer Cancer for the Benefit of Mankind (Paperback): Xu Xu Bin Ze Jie Wu Condense Wisdom and Conquer Cancer for the Benefit of Mankind (Paperback)
Xu Xu Bin Ze Jie Wu
R1,156 Discovery Miles 11 560 Ships in 10 - 15 working days
Swim to That Dream! (Paperback): Jie Wu Swim to That Dream! (Paperback)
Jie Wu
R343 Discovery Miles 3 430 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Multi-Functional Bamboo Standing Laptop…
R1,399 R669 Discovery Miles 6 690
Bostik Art & Craft White Glue (100ml)
R51 R33 Discovery Miles 330
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Chela-Preg Pre-Natal - Everyday…
R198 Discovery Miles 1 980
Bostik Clear Gel (25ml)
R40 R23 Discovery Miles 230
And So I Roar
Abi Dare Paperback R415 R289 Discovery Miles 2 890
Peptine Pro Equine Hydrolysed Collagen…
 (2)
R359 R249 Discovery Miles 2 490
Taurus Nixus Premium - Cordless Titanium…
 (1)
R873 Discovery Miles 8 730

 

Partners