|
Showing 1 - 8 of
8 matches in All Departments
Indoor location is one of the two most important contexts (time and
location), becoming a key entry for mobile Internet. This book
envisions potential indoor location applications, overviews the
related state of the art technologies, and presents original
patented techniques and open source prototype systems. The tutorial
and sample code are provided as a good reference and starting point
for readers who are interested in the technique detail.
This book presents a range of cloud computing platforms for
data-intensive scientific applications. It covers systems that
deliver infrastructure as a service, including: HPC as a service;
virtual networks as a service; scalable and reliable storage;
algorithms that manage vast cloud resources and applications
runtime; and programming models that enable pragmatic programming
and implementation toolkits for eScience applications. Many
scientific applications in clouds are also introduced, such as
bioinformatics, biology, weather forecasting and social networks.
Most chapters include case studies. Cloud Computing for
Data-Intensive Applications targets advanced-level students and
researchers studying computer science and electrical engineering.
Professionals working in cloud computing, networks, databases and
more will also find this book useful as a reference.
This book presents a range of cloud computing platforms for
data-intensive scientific applications. It covers systems that
deliver infrastructure as a service, including: HPC as a service;
virtual networks as a service; scalable and reliable storage;
algorithms that manage vast cloud resources and applications
runtime; and programming models that enable pragmatic programming
and implementation toolkits for eScience applications. Many
scientific applications in clouds are also introduced, such as
bioinformatics, biology, weather forecasting and social networks.
Most chapters include case studies. Cloud Computing for
Data-Intensive Applications targets advanced-level students and
researchers studying computer science and electrical engineering.
Professionals working in cloud computing, networks, databases and
more will also find this book useful as a reference.
This SpringerBrief analyzes the potential privacy threats in
wireless and mobile network environments, and reviews some existing
works. It proposes multiple privacy preserving techniques against
several types of privacy threats that are targeting users in a
mobile network environment. Depending on the network architecture,
different approaches can be adopted. The first proposed approach
considers a three-party system architecture where there is a
trusted central authority that can be used to protect users'
privacy. The second approach considers a totally distributed
environment where users perform privacy protection by themselves.
Finally, more general system architecture is discussed including
how a semi-trusted server may exist, but users need to collaborate
to achieve maximized privacy protection. This brief is designed for
researchers and professionals working with privacy preservation,
mobile networks, and threat models. The variety of approaches
presented makes it useful for students as well.
This SpringerBrief reviews the existing market-oriented strategies
for economically managing resource allocation in distributed
systems. It describes three new schemes that address
cost-efficiency, user incentives, and allocation fairness with
regard to different scheduling contexts. The first scheme, taking
the Amazon EC2 (TM) market as a case of study, investigates the
optimal resource rental planning models based on linear integer
programming and stochastic optimization techniques. This model is
useful to explore the interaction between the cloud infrastructure
provider and the cloud resource customers. The second scheme
targets a free-trade resource market, studying the interactions
amongst multiple rational resource traders. Leveraging an
optimization framework from AI, this scheme examines the
spontaneous exchange of resources among multiple resource owners.
Finally, the third scheme describes an experimental market-oriented
resource sharing platform inspired by eBay's transaction model. The
study presented in this book sheds light on economic models and
their implication to the utility-oriented scheduling problems.
|
Autonomic and Trusted Computing - 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings (Paperback, Edition.)
Jose M. Alcaraz Calero, Laurence T. Yang, Felix Gomez-Marmol, Luis Javier Garcia Villalba, Andy Xiaolin Li, …
|
R1,572
Discovery Miles 15 720
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 8th
International Conference on Autonomic and Trusted Computing, ATC
2011, held in Banff, Canada, September 2011.
The 17 revised full papers presented together with 1 keynote speech
were carefully reviewed and selected from numerous submissions. The
papers address all current issues in autonomic architectures,
models and systems, autonomic communications, trusted and secure
computing, reliable, secure and trust applications.
Indoor location is one of the two most important contexts (time and
location), becoming a key entry for mobile Internet. This book
envisions potential indoor location applications, overviews the
related state of the art technologies, and presents original
patented techniques and open source prototype systems. The tutorial
and sample code are provided as a good reference and starting point
for readers who are interested in the technique detail.
This volume contains important and active results in the fields of
Superlattices and Quantum Wells. It includes current prospects
regarding scientific discoveries and future device applications.
Papers are contributed by leading scientists in the world.
|
You may like...
Julius Caesar
Richard Appignanesi
Paperback
(2)
R292
R247
Discovery Miles 2 470
|