0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (7)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 14 of 14 matches in All Departments

Wireless Network Security (Hardcover, 2007 ed.): Yang Xiao, Xuemin Shen, Dingzhu Du Wireless Network Security (Hardcover, 2007 ed.)
Yang Xiao, Xuemin Shen, Dingzhu Du
R4,076 Discovery Miles 40 760 Ships in 18 - 22 working days

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.

Millimeter-Wave Networks - Beamforming Design and Performance Analysis (Hardcover, 1st ed. 2021): Peng Yang, Wen Wu, Ning... Millimeter-Wave Networks - Beamforming Design and Performance Analysis (Hardcover, 1st ed. 2021)
Peng Yang, Wen Wu, Ning Zhang, Xuemin Shen
R3,982 Discovery Miles 39 820 Ships in 10 - 15 working days

This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Due to significant beam alignment latency between the transmitter and the receiver in existing mmWave systems, this book proposes a machine learning based beam alignment algorithm for mmWave networks to determine the optimal beam pair with a low latency. Then, to analyze and enhance the performance of beamforming training (BFT) protocol in 802.11ad mmWave networks, an analytical model is presented to evaluate the performance of BFT protocol and an enhancement scheme is proposed to improve its performance in high user density scenarios. Furthermore, it investigates the beamforming-aided caching problem in mmWave networks, and proposes a device-to-device assisted cooperative edge caching to alleviate backhaul congestion and reduce content retrieval delay. This book concludes with future research directions in the related fields of study. The presented beamforming designs and the corresponding research results covered in this book, provides valuable insights for practical mmWave network deployment and motivate new ideas for future mmWave networking. This book targets researchers working in the fields of mmWave networks, beamforming design, and resource management as well as graduate students studying the areas of electrical engineering, computing engineering and computer science. Professionals in industry who work in this field will find this book useful as a reference.

Vehicular Networking for Road Safety (Hardcover, 1st ed. 2020): Feng Lyu, Minglu Li, Xuemin Shen Vehicular Networking for Road Safety (Hardcover, 1st ed. 2020)
Feng Lyu, Minglu Li, Xuemin Shen
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

The topics addressed in this book are crucial for both the academic community and industry, since the vehicular network has become an essential building block for intelligent transportation systems. The systematic principle of this book provides valuable guidance on the deployment and implementation of V2X-enabled road-safety applications. In addition, this book carries out structured technologies from the MAC layer to the link and network layer, which can provide a general introduction for interested readers with a comprehensive understanding of applying vehicular networks in enhancing road safety, and offers a systematized view for researchers and practitioners in the field of vehicular networks to help them optimize and improve the desired vehicular communication systems. Road safety has always been the first priority for daily commuters on the road. Vehicular networks can be an effective solution to enhance road safety, via which vehicles can exchange cooperative awareness messages rapidly, contributing to better situation awareness and maneuvering cooperation. However, with the fast-changing network topology, intermittent wireless link, and dynamic traffic density, it is challenging to achieve satisfying network performance. This book introduces the background of vehicular networks, provides a comprehensive overview of networking techniques in supporting road-safety applications, states the technical motivations per the MAC, link, and network layer, and proposes/designs vehicular networking technologies at the corresponding layer respectively to guarantee low-latency and reliable V2X communications for road-safety applications. By extending the proposed networking technologies to support all types of vehicular services, this book also outlines open issues and research directions in future 5G and beyond vehicular networks.

Computational Intelligence in Telecommunications Networks (Hardcover): Witold Pedrycz, Athanasios Vasilakos Computational Intelligence in Telecommunications Networks (Hardcover)
Witold Pedrycz, Athanasios Vasilakos; Contributions by Cynthia Hood, Dushy Tissainayagan, Ioannis Kassotakis, …
R5,244 Discovery Miles 52 440 Ships in 10 - 15 working days

Telecommunications has evolved and grown at an explosive rate in recent years and will undoubtedly continue to do so. As its functions, applications, and technology grow, it becomes increasingly complex and difficult, if not impossible, to meet the demands of a global network using conventional computing technologies. Computational intelligence (CI) is the technology of the future-and the future is now.

Computational Intelligence in Telecommunications Networks offers an in-depth look at the rapid progress of CI technology and shows its importance in solving the crucial problems of future telecommunications networks. It covers a broad range of topics, from Call Admission Control, congestion control, and QoS-routing for ATM networks, to network design and management, optical, mobile, and active networks, and Intelligent Mobile Agents.

Today's telecommunications professionals need a working knowledge of CI to exploit its potential to overcome emerging challenges. The CI community must become acquainted with those challenges to take advantage of the enormous opportunities the telecommunications field offers. This text meets both those needs, clearly, concisely, and with a depth certain to inspire further theoretical and practical advances.

Security and Privacy in Smart Grid (Paperback, 1st ed. 2018): Asmaa Abdallah, Xuemin Shen Security and Privacy in Smart Grid (Paperback, 1st ed. 2018)
Asmaa Abdallah, Xuemin Shen
R1,730 Discovery Miles 17 300 Ships in 18 - 22 working days

This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid's different communication networks and preserve the privacy of the involved. Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid's control center doesn't get enough information about customers' requirements and consequently can't prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers' requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution. That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid's resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid's control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.

Security and Privacy in Mobile Social Networks (Paperback, 2013 ed.): Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen Security and Privacy in Mobile Social Networks (Paperback, 2013 ed.)
Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen
R1,645 Discovery Miles 16 450 Ships in 18 - 22 working days

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014

Wireless Network Security (Paperback, Softcover reprint of hardcover 1st ed. 2007): Yang Xiao, Xuemin Shen, Dingzhu Du Wireless Network Security (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Yang Xiao, Xuemin Shen, Dingzhu Du
R4,048 Discovery Miles 40 480 Ships in 18 - 22 working days

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.

Parallel Algorithms for Optimal Control of Large Scale Linear Systems (Paperback, Softcover reprint of the original 1st ed.... Parallel Algorithms for Optimal Control of Large Scale Linear Systems (Paperback, Softcover reprint of the original 1st ed. 1993)
Zoran Gajic, Xuemin Shen
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

Parallel Algorithms for Optimal Control of Large Scale Linear Systems is a comprehensive presentation for both linear and bilinear systems. The parallel algorithms presented in this book are applicable to a wider class of practical systems than those served by traditional methods for large scale singularly perturbed and weakly coupled systems based on the power-series expansion methods. It is intended for scientists and advance graduate students in electrical engineering and computer science who deal with parallel algorithms and control systems, especially large scale systems. The material presented is both comprehensive and unique.

Singularly Perturbed and Weakly Coupled Linear Control Systems - A Recursive Approach (Paperback): Zoran Gajic, Djordjija... Singularly Perturbed and Weakly Coupled Linear Control Systems - A Recursive Approach (Paperback)
Zoran Gajic, Djordjija Petkovski, Xuemin Shen
R1,403 Discovery Miles 14 030 Ships in 18 - 22 working days

This book provides a comprehensive view of current developments in the theory of recursive reduced-order methods for singularly perturbed and weakly coupled linear control systems. The recursive methods offer several advantages: high accuracy can easily be achieved at low cost, parallel processing can be used, results are obtained under mild assumptions, and software and hardware implementation of the control algorithms is highly simplified. The book emphasizes mathematical developments as well as their application to solving practical problems. A number of real world examples demonstrating the usefulness of the theory are included.

Millimeter-Wave Networks - Beamforming Design and Performance Analysis (Paperback, 1st ed. 2021): Peng Yang, Wen Wu, Ning... Millimeter-Wave Networks - Beamforming Design and Performance Analysis (Paperback, 1st ed. 2021)
Peng Yang, Wen Wu, Ning Zhang, Xuemin Shen
R3,978 Discovery Miles 39 780 Ships in 18 - 22 working days

This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Due to significant beam alignment latency between the transmitter and the receiver in existing mmWave systems, this book proposes a machine learning based beam alignment algorithm for mmWave networks to determine the optimal beam pair with a low latency. Then, to analyze and enhance the performance of beamforming training (BFT) protocol in 802.11ad mmWave networks, an analytical model is presented to evaluate the performance of BFT protocol and an enhancement scheme is proposed to improve its performance in high user density scenarios. Furthermore, it investigates the beamforming-aided caching problem in mmWave networks, and proposes a device-to-device assisted cooperative edge caching to alleviate backhaul congestion and reduce content retrieval delay. This book concludes with future research directions in the related fields of study. The presented beamforming designs and the corresponding research results covered in this book, provides valuable insights for practical mmWave network deployment and motivate new ideas for future mmWave networking. This book targets researchers working in the fields of mmWave networks, beamforming design, and resource management as well as graduate students studying the areas of electrical engineering, computing engineering and computer science. Professionals in industry who work in this field will find this book useful as a reference.

Vehicular Networking for Road Safety (Paperback, 1st ed. 2020): Feng Lyu, Minglu Li, Xuemin Shen Vehicular Networking for Road Safety (Paperback, 1st ed. 2020)
Feng Lyu, Minglu Li, Xuemin Shen
R2,621 Discovery Miles 26 210 Ships in 18 - 22 working days

The topics addressed in this book are crucial for both the academic community and industry, since the vehicular network has become an essential building block for intelligent transportation systems. The systematic principle of this book provides valuable guidance on the deployment and implementation of V2X-enabled road-safety applications. In addition, this book carries out structured technologies from the MAC layer to the link and network layer, which can provide a general introduction for interested readers with a comprehensive understanding of applying vehicular networks in enhancing road safety, and offers a systematized view for researchers and practitioners in the field of vehicular networks to help them optimize and improve the desired vehicular communication systems. Road safety has always been the first priority for daily commuters on the road. Vehicular networks can be an effective solution to enhance road safety, via which vehicles can exchange cooperative awareness messages rapidly, contributing to better situation awareness and maneuvering cooperation. However, with the fast-changing network topology, intermittent wireless link, and dynamic traffic density, it is challenging to achieve satisfying network performance. This book introduces the background of vehicular networks, provides a comprehensive overview of networking techniques in supporting road-safety applications, states the technical motivations per the MAC, link, and network layer, and proposes/designs vehicular networking technologies at the corresponding layer respectively to guarantee low-latency and reliable V2X communications for road-safety applications. By extending the proposed networking technologies to support all types of vehicular services, this book also outlines open issues and research directions in future 5G and beyond vehicular networks.

Sustainable Wireless Networks (Paperback, 2013 ed.): Zhongming Zheng, Lin X. Cai, Xuemin Shen Sustainable Wireless Networks (Paperback, 2013 ed.)
Zhongming Zheng, Lin X. Cai, Xuemin Shen
R1,550 Discovery Miles 15 500 Ships in 18 - 22 working days

This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their energy and put the network out of service due to the unreliable energy supply. This brief also studies network resource management issues in green wireless networks to minimize cost. It jointly considers the relay node (RN) placement and sub-carrier allocation (RNP-SA) issues in wireless networks with sustainable energy, and then formulates the problem into a mixed integer non-linear programming problem. Concise and informative, this brief is a useful resource for professionals or researchers studying wireless networks, communication networks, and energy efficiency. Advanced-level students interested in energy technology or communications engineering will also find the material valuable.

Realizing the Metaverse - A Communications and Networking Perspective: Wei Yang Bryan Lim, Dusit Niyato, Jun-Shan Zhang, Zehui... Realizing the Metaverse - A Communications and Networking Perspective
Wei Yang Bryan Lim, Dusit Niyato, Jun-Shan Zhang, Zehui Xiong, Xuemin Shen
R2,875 Discovery Miles 28 750 Ships in 9 - 17 working days
Handbook of Peer-to-Peer Networking (Hardcover, 2010 ed.): Xuemin Shen, Heather Yu, John Buford, Mursalin Akon Handbook of Peer-to-Peer Networking (Hardcover, 2010 ed.)
Xuemin Shen, Heather Yu, John Buford, Mursalin Akon
R9,392 Discovery Miles 93 920 Ships in 10 - 15 working days

Peer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. There are a large range of other applications under development or being proposed. The - derlying architectures share features such as decentralizaton, sharing of end system resources, autonomy, virtualization, and self-organization. These features constitute the P2P paradigm. This handbook broadly addresses a large cross-section of c- rent research and state-of-the-art reports on the nature of this paradigm from a large number of experts in the ?eld. Several trends in information and network technology such as increased perf- mance and deployment of broadband networking, wireless networking, and mobile devices are synergistic with and reinforcing the capabilities of the P2P paradigm. There is general expectation in the technical community that P2P networking will continue to be an important tool for networked applications and impact the evo- tion of the Internet. A large amount of research activity has resulted in a relatively short time, and a growing community of researchers has developed. The Handbook of Peer-to-Peer Networking is dedicated to discussions on P2P networks and their applications. This is a comprehensive book on P2P computing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Precarious Power - Compliance And…
Susan Booysen Paperback  (4)
R380 R351 Discovery Miles 3 510
Into A Raging Sea - Great South African…
Tony Weaver, Andrew Ingram Paperback  (2)
R330 Discovery Miles 3 300
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, … Paperback R320 R290 Discovery Miles 2 900
Guide To Sieges Of South Africa…
Nicki Von Der Heyde Paperback  (4)
R250 R231 Discovery Miles 2 310
Asg,parts kit, cz and sti duty series…
R325 R299 Discovery Miles 2 990
More Encounters with Star People - Urban…
Ardy Sixkiller Clarke Hardcover R837 Discovery Miles 8 370
UTG RGPM-30M4 sporting type 30mm/2pcs…
R410 R370 Discovery Miles 3 700
Atlantis and the Garden of Eden
Frederick Dodson Hardcover R872 Discovery Miles 8 720
Gender and Representations of the Female…
Akiko Kusunoki Hardcover R2,446 R1,816 Discovery Miles 18 160
The Complete Letters of Lady Mary…
Mary Wortley Montagu Hardcover R1,592 Discovery Miles 15 920

 

Partners