Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Duplicate Items
Add to My List

Print
Sorts and Limits


Title: Simulation of computer communication systems / Charles H. Sauer, Edward A. MacNair.
Computer communication systems.

Author: Sauer, Charles H.
MacNair, Edward A.

General Notes: Includes index., Includes index.
Publisher: Prentice-Hall,
Publication Place: Englewood Cliffs, N.J. :
ISBN: 0138111251
Subject: Computer networks -- Simulation methods.
Queuing theory.

Physical Description: xvi, 158 p. : ill. ;
Publication Date: c1983.

There are no items available

Title: Computer communications.
Macmillan computer science series

Author: Cole, Robert.
Publisher: Macmillan,
Publication Place: London :
ISBN: 0333395026
Subject: Sistemas de transmisiâon de datos.
Series: Macmillan computer science series
Edition: 2 ed.
Physical Description: viii, 173 p. : ilus. ;
Publication Date: 1986.

There are no items available

Title: Comput. Commun.
Computer Communications.

General Notes: EBSCOhost.
Gale Group.
Computer and Information Systems Abstracts Journal
Computer & Communications Security Abstracts
Science Citation Index
Zentralblatt MATH
Also available online.

Publisher: IPC Science and Technology Press,
Elsevier BV,

Publication Place: [Guildford, Eng. ; New York, N.Y.] :
Amsterdam :

ISSN: 0140-3664
Subject: COMPUTER NETWORKS -- PERIODICALS.
Location/SubLocation: HU
Electronic Location: Web site
Full text


There are no items available

Title: Computer communications / edited by Paul E. Green, Jr., Robert W. Lucky.
IEEE Press selected reprint series

Author: Green, Paul Eliot, 1924-
Lucky, R. W.

General Notes: Includes bibliographies and indexes.
Publisher: IEEE Press : [distributed by Wiley,
Publication Place: New York :
ISBN: 0879420413 :
0879420421

Subject: Data transmission systems.
Computer networks.

Series: IEEE Press selected reprint series
Physical Description: vii, 615 p. : ill. ;
Publication Date: 1975]

There are no items available

Title: Computer communications / editor , Wushow Chou.
Author: Chou, W (Wushow)
Publisher: Prentice - Hall,
Publication Place: Englewood Cliffs , N:
Subject: Computer Networks
Data transmission systems

Physical Description: v.
Publication Date: 1983.

There are no items available

Title: Computer communications / editor, Wushow Chou ; contributors, Wushow Chou ... [et al.].
Author: Chou, Wushow.
General Notes: Includes bibliographies and index.
v. 1. Principles ­­ v. 2. Systems and applications.

Publisher: Prentice­Hall,
Publication Place: Englewood Cliffs, NJ :
ISBN: 0131650432 (v. 1)
0131650505 (v. 2)

Subject: Computer networks.
Data transmission systems.

Contents: v. 1. Principles ­­ v. 2. Systems and applications.
Physical Description: 2 v. : ill. ;
Publication Date: c1983­c1985.

There are no items available

Title: Computer communications / K.G. Beauchamp.
Aspects of information technology

Author: Beauchamp, K. G. (Kenneth George), 1923-
Publisher: Van Nostrand Reinhold (UK),
Publication Place: Wokingham, England :
ISBN: 0278000126
Subject: Computer networks.
Series: Aspects of information technology
Physical Description: xiv, 263 p. : ill. ;
Location/SubLocation: CaOONL NL Stacks
Publication Date: 1987.

There are no items available

Title: Computer communications / K.G. Beauchamp.
Author: Beauchamp, K.G.
General Notes: Includes bibliographical references and index.
Publisher: Chapman and Hall,
Publication Place: London ; New York :
ISBN: 0412370700
Subject: Computer networks.
Telecommunication systems.

Edition: 2nd ed.
Physical Description: xviii, 334 p. ;
Publication Date: 1990, c1987.

There are no items available

Title: Computer communications / K.G. Beauchamp and Gee-Swee Poo.
Author: Beauchamp, K.G.
Poo, G. S. (Gee-Swee)

General Notes: Includes bibliographical references (p. [300]-310) and index.
Publisher: International Thomson Computer Press,
Publication Place: London ; Boston :
ISBN: 185032168X
Subject: Computer networks.
Telecommunication systems.
Sistemas de transmisiâon de datos.

Edition: 3rd ed.
Physical Description: xix, 332 p. : ill. ;
Publication Date: 1995.

There are no items available

Title: Computer communications : principles and business applications / Andy Sloane.
Author: Sloane, Andy, 1954-
General Notes: Includes bibliographical references and index.
Publisher: McGraw-Hill,
Publication Place: London ; New York :
ISBN: 0077094433
9780077094430

Subject: Computer networks.
Communications software.

Edition: 2nd ed.
Physical Description: xvi, 327 p. : ill. ;
Publication Date: c1999.

There are no items available

Title: Computer communications and networking technologies / Michael A. Gallo, William M. Hancock.
Author: Gallo, Michael A.
Hancock, Bill, 1957-

General Notes: Includes bibliographical references and index.
Publisher: Brooks/Cole,
Publication Place: Pacific Grove, CA :
ISBN: 0534377807
Subject: Computer networks.
Telecommunication.

Physical Description: xxiii, 632 p. : ill. ;
Publication Date: c2002.

There are no items available


There are no items available


There are no items available


There are no items available

Title: Networked RFID Systems, Software and Services / .
Computer communications and networks

Author: Roussos.
SpringerLink (Online service)

Publisher: Springer-Verlag London,
Publication Place: London :
ISBN: 9781848001534
Subject: Computer science
Series: Computer communications and networks
Physical Description: v.: digital
Electronic Location: http://dx.doi.org/10.1007/978-1-84800-153-4
Publication Date: 2008.

There are no items available

Title: Ubiquitous and pervasive commerce : new frontiers for electronic business / George Roussos (ed.).
Computer communications and networks

Author: Roussos, George.
General Notes: Includes index., Includes index.
Publisher: Springer,
Publication Place: London :
ISBN: 9781846280351(pbk.)
1846280354 (pbk.)

Subject: Electronic commerce.
Ubiquitous computing.
Comercio electrâonico.
Computaciâon omnipresente.

Series: Computer communications and networks
Contents: Ubiquitous computing for electronic business / Supply chain management standards in ubiquitous commerce / RFID in movable asset management / Ubiquitous services: extending customer relationship management / The business value of ubiquitous computing technologies / Ubiquitous computing, customer tracking, and price discrimination / The design of persuasive retail experiences / Legal challenges to ubiquitous commerce / Thoughts on retail system design to support polimorphic actions among clerks: that'll be $20 - but if you buy two, I'll knock off 10% / Privacy protection and RFID / The Code of Fair Information Practices -- The ISTAG Maria scenario.
Physical Description: xiv, 194 p. : ill. ;
Electronic Location: http://www.loc.gov/catdir/enhancements/fy0663/2005929865-d.html
http://www.loc.gov/catdir/enhancements/fy0818/2005929865-t.html

Publication Date: c2006.

There are no items available

Title: A guide to computer network security / Joseph Migga Kizza.
Computer communications and networks,
Computer communications and networks.

Author: Kizza, Joseph Migga.
General Notes: Includes bibliographical references and index.
Publisher: Springer,
Publication Place: London :
ISBN: 184800916X
9781848009165

Subject: Computer networks -- Security measures.
Series: Computer communications and networks,
Computer communications and networks.

Physical Description: xxiv, 476 p. : ill. ;
Publication Date: c2009.

There are no items available

Title: A guide to computer network security / Joseph Migga Kizza.
Computer communications and networks,
Computer communications and networks.

Author: Kizza, Joseph Migga.
General Notes: Includes bibliographical references and index.
Publisher: Springer,
Publication Place: London :
ISBN: 184800916X
9781848009165

Subject: Computer networks -- Security measures.
Series: Computer communications and networks,
Computer communications and networks.

Physical Description: xxiv, 476 p. : ill. ;
Publication Date: c2009.

There are no items available

Title: Grid Computing Towards a Global Interconnected Infrastructure / edited by Nikolaos P. Preve.
Computer Communications and Networks,
Computer communications and networks,

Author: Preve, Nikolaos P.
SpringerLink (Online service)

General Notes: <p><b>Part I: E-Science, Applications, &amp; Optimization -- </b>Leveraging the Grid for e-Science -- Supporting e-Science Applications on e-Infrastructure -- GEMS -- Performance Analysis and Optimization of Linear Workflows in Heterogeneous Network Environments -- <b>Part II: Resource Management, Allocation, &amp; Monitoring -- </b>Resource Management and Service Deployment in Grids -- Social Grid Agents -- Monitoring and Controlling Grid Systems -- <b>Part III: Grid Services &amp; Middleware -- </b>Service Level Agreement for Job Control in Grid and High-Performance Computing -- Composable Services Architectures for Grids -- Phoenix -- <b>Part IV: Grid Computing &amp; Scientific Problems -- </b>State-of-art with PhyloGrid -- The Usage of the Grid in the Simulation of the Comet Oort-Cloud Formation.</p>.
<p>Grid computing provides a mechanism for integrating, coordinating, and sharing heterogeneous computer resources.  This continually evolving field now aims to completely disaggregate current computer platforms and distribute them across a network as resources that can be called into action by any eligible user or machine at any time.</p><p><p>This accessible and broad-ranging text/reference presents valuable research and results from many of the major projects involved in the emerging global grid infrastructure.  With a particular focus on the practical advantages and applications of grid computing – including real case studies – the book provides an in-depth study of grid technology for a wide range of different needs.</p><p><p><b>Topics and features:</b></p><p><ul><li>Presents contributions from an international selection of experts in the field</li><li>Provides summarizing abstracts and conclusions for each chapter</li><li>Examines a remote instrumentation infrastructure, and a methodology to support e-science applications on e-infrastructures</li><li>Describes the GEMS storage system, and pipeline workflows for optimizing end-to-end performance in wide-area networks</li><li>Investigates semantic grid system architecture, social grid agents, and monitoring platforms designed for large-scale distributed systems</li><li>Explores job control using service-level agreements</li><li>Introduces the Composable Services Architecture for dynamic service provisioning, and the semantically driven communication middleware platform, Phoenix</li><li>Discusses the PhyloGrid application, and a numerical simulation performed using grid computing</li></ul><p><p>The deep insights that can be gleaned from the text make it a highly useful tool for researchers and professionals alike.  Graduate students will also benefit from the extensive analysis on currently available grid systems.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9780857296764
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <p><b>Part I: E-Science, Applications, &amp; Optimization -- </b>Leveraging the Grid for e-Science -- Supporting e-Science Applications on e-Infrastructure -- GEMS -- Performance Analysis and Optimization of Linear Workflows in Heterogeneous Network Environments -- <b>Part II: Resource Management, Allocation, &amp; Monitoring -- </b>Resource Management and Service Deployment in Grids -- Social Grid Agents -- Monitoring and Controlling Grid Systems -- <b>Part III: Grid Services &amp; Middleware -- </b>Service Level Agreement for Job Control in Grid and High-Performance Computing -- Composable Services Architectures for Grids -- Phoenix -- <b>Part IV: Grid Computing &amp; Scientific Problems -- </b>State-of-art with PhyloGrid -- The Usage of the Grid in the Simulation of the Comet Oort-Cloud Formation.</p>.
Physical Description: XV, 312p. 118 illus. digital.
Electronic Location: http://dx.doi.org/10.1007/978-0-85729-676-4
Publication Date: 2011.

There are no items available

Title: Grid Computing Towards a Global Interconnected Infrastructure / edited by Nikolaos P. Preve.
Computer Communications and Networks,
Computer communications and networks,

Author: Preve, Nikolaos P.
SpringerLink (Online service)

General Notes: <p><b>Part I: E-Science, Applications, &amp; Optimization -- </b>Leveraging the Grid for e-Science -- Supporting e-Science Applications on e-Infrastructure -- GEMS -- Performance Analysis and Optimization of Linear Workflows in Heterogeneous Network Environments -- <b>Part II: Resource Management, Allocation, &amp; Monitoring -- </b>Resource Management and Service Deployment in Grids -- Social Grid Agents -- Monitoring and Controlling Grid Systems -- <b>Part III: Grid Services &amp; Middleware -- </b>Service Level Agreement for Job Control in Grid and High-Performance Computing -- Composable Services Architectures for Grids -- Phoenix -- <b>Part IV: Grid Computing &amp; Scientific Problems -- </b>State-of-art with PhyloGrid -- The Usage of the Grid in the Simulation of the Comet Oort-Cloud Formation.</p>.
<p>Grid computing provides a mechanism for integrating, coordinating, and sharing heterogeneous computer resources.  This continually evolving field now aims to completely disaggregate current computer platforms and distribute them across a network as resources that can be called into action by any eligible user or machine at any time.</p><p><p>This accessible and broad-ranging text/reference presents valuable research and results from many of the major projects involved in the emerging global grid infrastructure.  With a particular focus on the practical advantages and applications of grid computing – including real case studies – the book provides an in-depth study of grid technology for a wide range of different needs.</p><p><p><b>Topics and features:</b></p><p><ul><li>Presents contributions from an international selection of experts in the field</li><li>Provides summarizing abstracts and conclusions for each chapter</li><li>Examines a remote instrumentation infrastructure, and a methodology to support e-science applications on e-infrastructures</li><li>Describes the GEMS storage system, and pipeline workflows for optimizing end-to-end performance in wide-area networks</li><li>Investigates semantic grid system architecture, social grid agents, and monitoring platforms designed for large-scale distributed systems</li><li>Explores job control using service-level agreements</li><li>Introduces the Composable Services Architecture for dynamic service provisioning, and the semantically driven communication middleware platform, Phoenix</li><li>Discusses the PhyloGrid application, and a numerical simulation performed using grid computing</li></ul><p><p>The deep insights that can be gleaned from the text make it a highly useful tool for researchers and professionals alike.  Graduate students will also benefit from the extensive analysis on currently available grid systems.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9780857296764
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <p><b>Part I: E-Science, Applications, &amp; Optimization -- </b>Leveraging the Grid for e-Science -- Supporting e-Science Applications on e-Infrastructure -- GEMS -- Performance Analysis and Optimization of Linear Workflows in Heterogeneous Network Environments -- <b>Part II: Resource Management, Allocation, &amp; Monitoring -- </b>Resource Management and Service Deployment in Grids -- Social Grid Agents -- Monitoring and Controlling Grid Systems -- <b>Part III: Grid Services &amp; Middleware -- </b>Service Level Agreement for Job Control in Grid and High-Performance Computing -- Composable Services Architectures for Grids -- Phoenix -- <b>Part IV: Grid Computing &amp; Scientific Problems -- </b>State-of-art with PhyloGrid -- The Usage of the Grid in the Simulation of the Comet Oort-Cloud Formation.</p>.
Physical Description: XV, 312p. 118 illus. digital.
Electronic Location: http://dx.doi.org/10.1007/978-0-85729-676-4
Publication Date: 2011.

There are no items available

Title: Guide to Wireless Ad Hoc Networks edited by Subhas Chandra Misra, Isaac Woungang, Sudip Misra.
Computer Communications and Networks,
Computer communications and networks,

Author: Misra, Subhas Chandra.
Woungang, Isaac.
Misra, Sudip.
SpringerLink (Online service)

General Notes: <P>From the contents</P> <P>Properties of Wireless Multihop Networks in Theory and Practice -- Self-configuring, Self-organizing, and Self-healing Schemes in Mobile and Ad Hoc Networks -- Cooperation in Mobile Ad Hoc Networks -- Routing in Mobile Ad Hoc Networks -- Multicasting in Mobile Ad Hoc Networks -- Broadcast in Ad Hoc Networks -- Geographic Routing in Wireless Ad Hoc Networks -- Formal Verification of Routing Protocols for Wireless Ad Hoc Networks -- Mobility Management in Mobile Ad Hoc Networks -- Mobility Models for Ad Hoc Networks -- Models for Realistic Mobility and Radio Wave Propagation for Ad-hoc Network Simulations -- Quality of Service Support in Wireless Ad Hoc Networks -- Delay Management in Wireless Ad Hoc Networks -- Address Allocation Mechanisms for Mobile Ad Hoc Networks -- Congestion Control in Wireless Ad Hoc Networks -- Security in Wireless Ad Hoc Networks -- Intrusion Detection in Mobile Ad Hoc Networks -- Security Threats in Ad Hoc Routing Protocols.</P>.
<P>Wireless ad-hoc network communication technologies have experienced a steep growth in research and significant advancements in recent times due to their important advantages. These benefits help to set-up a network fast in situations where there is no existing network set-up, or when setting up a fixed infrastructure network is considered infeasible. However, there are challenges that still need to be addressed.</P> <P></P> <P>This indispensable guidebook provides a comprehensive resource on the new ideas and results in the areas of mobile ad-hoc networks and other ad-hoc computing systems in the wireless communication technology field. Wireless ad-hoc networks are explored by leading experts in the field from both academia and industry, with discussions on various challenges in varied environments, standards, routing mechanisms, etc. This reader-friendly, broad-ranging text features in-depth descriptions of terminologies and concepts related to the diverse subject areas germane to wireless ad hoc communication.</P> <P><STRONG>Features:</STRONG></P> <P>• Provides an accessible, comprehensive overview of the state-of-the-art technology of wireless ad-hoc networks</P> <P>• Includes reader-friendly discussions for practitioners, directions for future research, and helpful lists of terms and definitions</P> <P>• Offers a set of summary questions at the end of each chapter to help readers assess their understanding of the various concepts</P> <P>• Presents insight into the practical significance of these topics in real-world scenarios</P> <P>• Designed, in structure and content, to aid the learning process with the intention of making the book useful at all learning levels</P> <P>• Supplies supportive PowerPoint presentation slides and solutions to aid lecturers at www.springer.com/978-1-84800-327-9</P> <P></P> <P>This wide-ranging and highly useful guide will be a valuable reference/text in the field for researchers, engineers and strategists needing to know about this technology. It is also an ideal textbook for graduate students wishing to learn more about the topic.</P> <P><STRONG>Key Topics:</STRONG></P> <P>• Routing</P> <P>• Mobility Management</P> <P>• Quality of Service Support</P> <P>• Congestion Control</P> <P>• Security</P> <P>• Trust Management</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848003286
Subject: Computer science.
Computer network architectures.
Computer Communication Networks.
Telecommunication.
Computer science.
Computer Communication Networks.
Communications Engineering, Networks.
Computer Systems Organization and Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>From the contents</P> <P>Properties of Wireless Multihop Networks in Theory and Practice -- Self-configuring, Self-organizing, and Self-healing Schemes in Mobile and Ad Hoc Networks -- Cooperation in Mobile Ad Hoc Networks -- Routing in Mobile Ad Hoc Networks -- Multicasting in Mobile Ad Hoc Networks -- Broadcast in Ad Hoc Networks -- Geographic Routing in Wireless Ad Hoc Networks -- Formal Verification of Routing Protocols for Wireless Ad Hoc Networks -- Mobility Management in Mobile Ad Hoc Networks -- Mobility Models for Ad Hoc Networks -- Models for Realistic Mobility and Radio Wave Propagation for Ad-hoc Network Simulations -- Quality of Service Support in Wireless Ad Hoc Networks -- Delay Management in Wireless Ad Hoc Networks -- Address Allocation Mechanisms for Mobile Ad Hoc Networks -- Congestion Control in Wireless Ad Hoc Networks -- Security in Wireless Ad Hoc Networks -- Intrusion Detection in Mobile Ad Hoc Networks -- Security Threats in Ad Hoc Routing Protocols.</P>.
Physical Description: digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84800-328-6
Publication Date: 2009.

There are no items available

Title: Guide to Wireless Ad Hoc Networks edited by Subhas Chandra Misra, Isaac Woungang, Sudip Misra.
Computer Communications and Networks,
Computer communications and networks,

Author: Misra, Subhas Chandra.
Woungang, Isaac.
Misra, Sudip.
SpringerLink (Online service)

General Notes: <P>From the contents</P> <P>Properties of Wireless Multihop Networks in Theory and Practice -- Self-configuring, Self-organizing, and Self-healing Schemes in Mobile and Ad Hoc Networks -- Cooperation in Mobile Ad Hoc Networks -- Routing in Mobile Ad Hoc Networks -- Multicasting in Mobile Ad Hoc Networks -- Broadcast in Ad Hoc Networks -- Geographic Routing in Wireless Ad Hoc Networks -- Formal Verification of Routing Protocols for Wireless Ad Hoc Networks -- Mobility Management in Mobile Ad Hoc Networks -- Mobility Models for Ad Hoc Networks -- Models for Realistic Mobility and Radio Wave Propagation for Ad-hoc Network Simulations -- Quality of Service Support in Wireless Ad Hoc Networks -- Delay Management in Wireless Ad Hoc Networks -- Address Allocation Mechanisms for Mobile Ad Hoc Networks -- Congestion Control in Wireless Ad Hoc Networks -- Security in Wireless Ad Hoc Networks -- Intrusion Detection in Mobile Ad Hoc Networks -- Security Threats in Ad Hoc Routing Protocols.</P>.
<P>Wireless ad-hoc network communication technologies have experienced a steep growth in research and significant advancements in recent times due to their important advantages. These benefits help to set-up a network fast in situations where there is no existing network set-up, or when setting up a fixed infrastructure network is considered infeasible. However, there are challenges that still need to be addressed.</P> <P></P> <P>This indispensable guidebook provides a comprehensive resource on the new ideas and results in the areas of mobile ad-hoc networks and other ad-hoc computing systems in the wireless communication technology field. Wireless ad-hoc networks are explored by leading experts in the field from both academia and industry, with discussions on various challenges in varied environments, standards, routing mechanisms, etc. This reader-friendly, broad-ranging text features in-depth descriptions of terminologies and concepts related to the diverse subject areas germane to wireless ad hoc communication.</P> <P><STRONG>Features:</STRONG></P> <P>• Provides an accessible, comprehensive overview of the state-of-the-art technology of wireless ad-hoc networks</P> <P>• Includes reader-friendly discussions for practitioners, directions for future research, and helpful lists of terms and definitions</P> <P>• Offers a set of summary questions at the end of each chapter to help readers assess their understanding of the various concepts</P> <P>• Presents insight into the practical significance of these topics in real-world scenarios</P> <P>• Designed, in structure and content, to aid the learning process with the intention of making the book useful at all learning levels</P> <P>• Supplies supportive PowerPoint presentation slides and solutions to aid lecturers at www.springer.com/978-1-84800-327-9</P> <P></P> <P>This wide-ranging and highly useful guide will be a valuable reference/text in the field for researchers, engineers and strategists needing to know about this technology. It is also an ideal textbook for graduate students wishing to learn more about the topic.</P> <P><STRONG>Key Topics:</STRONG></P> <P>• Routing</P> <P>• Mobility Management</P> <P>• Quality of Service Support</P> <P>• Congestion Control</P> <P>• Security</P> <P>• Trust Management</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848003286
Subject: Computer science.
Computer network architectures.
Computer Communication Networks.
Telecommunication.
Computer science.
Computer Communication Networks.
Communications Engineering, Networks.
Computer Systems Organization and Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>From the contents</P> <P>Properties of Wireless Multihop Networks in Theory and Practice -- Self-configuring, Self-organizing, and Self-healing Schemes in Mobile and Ad Hoc Networks -- Cooperation in Mobile Ad Hoc Networks -- Routing in Mobile Ad Hoc Networks -- Multicasting in Mobile Ad Hoc Networks -- Broadcast in Ad Hoc Networks -- Geographic Routing in Wireless Ad Hoc Networks -- Formal Verification of Routing Protocols for Wireless Ad Hoc Networks -- Mobility Management in Mobile Ad Hoc Networks -- Mobility Models for Ad Hoc Networks -- Models for Realistic Mobility and Radio Wave Propagation for Ad-hoc Network Simulations -- Quality of Service Support in Wireless Ad Hoc Networks -- Delay Management in Wireless Ad Hoc Networks -- Address Allocation Mechanisms for Mobile Ad Hoc Networks -- Congestion Control in Wireless Ad Hoc Networks -- Security in Wireless Ad Hoc Networks -- Intrusion Detection in Mobile Ad Hoc Networks -- Security Threats in Ad Hoc Routing Protocols.</P>.
Physical Description: digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84800-328-6
Publication Date: 2009.


Title: Algorithms for Next Generation Networks edited by Graham Cormode, Marina Thottan.
Computer Communications and Networks,
Computer communications and networks,

Author: Cormode, Graham.
Thottan, Marina.
SpringerLink (Online service)

General Notes: <P>Design for Optimizability.-&nbsp; Valiant Load-Balancing -- Geometric Capacity Provisioning for Wavelength-Switched WDM Networks -- Spectrum and Interference Management in Next-Generation Wireless Networks -- Cross-layer Capacity Estimation and Throughput Maximization in Wireless Networks -- Resource Allocation Algorithms for the Next Generation Cellular Networks -- Ethernet Based Services for Next Generation Networks -- Overlay Networks.-&nbsp; Hash-Based Techniques for High-Speed Packet Processing -- Fast Packet Pattern Matching Algorithms -- Anomaly Detection Approaches for Communication Networks -- Model-Based Anomaly Detection for A Transparent Optical Transmission System -- In-Network Monitoring -- Algebraic Approaches for Scalable End-to-End Monitoring and Diagnosis -- Network Coding and its Applications in Communication Networks -- Next Generation Search -- At The Intersection Of Networks And Highly Interactive Online Games -- Wayfinding in Social Networks.</P>.
<P>With the dawn of this new century, we are now on the verge of expanding the notion of what we mean to communicate. A new generation of "netizens" are poised to leverage the Internet for a myriad different applications that we have not envisioned thus far. This will require that the Internet be flexible and adapt to accommodate the requirements of next generation applications. </P> <P></P> <P>This important and timely volume presents a comprehensive survey of the algorithms and methodologies presently used in the design and deployment of the Internet. Issues of network design, network operations and management, and emerging applications are discussed by a collection of experts on the algorithmic foundations of the Internet. Covering topics at the intersection of algorithms and networking, the book builds a complete picture of the current state of research on next generation networks and the challenges for the years ahead.</P> <P></P> <P><STRONG>Topics and features</STRONG></P> <P></P> <P>* Contains a Foreword by Charles R. Kalmanek, and contributions from leading researchers in the field</P> <P></P> <P>* Outlines the goals for optimization in network design, considering optimizability of protocols and the optimum placement of network functionality, and presenting the idea of Valiant load balancing</P> <P></P> <P>* Investigates the influence of physical network characteristics in the design of robust network services, covering algorithms used for optimal capacity provisioning in optical networks, spectrum management in wireless networks, cross-layer algorithms and resource allocation problems in cellular networks</P> <P></P> <P>* Explores algorithms for overlay networks which consider the interactions of different overlay networks and take into account the coexistence of underlay services in the basic network infrastructure</P> <P></P> <P>* Examines the challenge of processing packets at high speeds, surveying Hash-based techniques for high speed packet processing and fast packet pattern matching algorithms</P> <P></P> <P>* Discusses the issue of network management in the face of ever increasing heterogeneity in applications, surveying anomaly detection approaches and network monitoring </P> <P></P> <P>* Reviews the algorithmic techniques behind emerging applications, surveying the evolution of Internet search applications, online gaming and social networking</P> <P></P> <P>Promoting a thorough understanding of the algorithms used by the Internet today as the critical basis for the development of new algorithms that will form the future Internet, this essential text will be of interest to a broad readership – from graduate students to researchers in data networking.</P> <P></P> <P><STRONG>Dr. Graham Cormode </STRONG>is a Technical Specialist at AT&amp;T Labs Research. <STRONG>Dr. Marina Thottan </STRONG>is a Member of Technical Staff at Bell Labs Research.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848827653
Subject: Computer science.
Computer network architectures.
Computer Communication Networks.
Computer science.
Computer Communication Networks.
Computer Systems Organization and Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Design for Optimizability.-&nbsp; Valiant Load-Balancing -- Geometric Capacity Provisioning for Wavelength-Switched WDM Networks -- Spectrum and Interference Management in Next-Generation Wireless Networks -- Cross-layer Capacity Estimation and Throughput Maximization in Wireless Networks -- Resource Allocation Algorithms for the Next Generation Cellular Networks -- Ethernet Based Services for Next Generation Networks -- Overlay Networks.-&nbsp; Hash-Based Techniques for High-Speed Packet Processing -- Fast Packet Pattern Matching Algorithms -- Anomaly Detection Approaches for Communication Networks -- Model-Based Anomaly Detection for A Transparent Optical Transmission System -- In-Network Monitoring -- Algebraic Approaches for Scalable End-to-End Monitoring and Diagnosis -- Network Coding and its Applications in Communication Networks -- Next Generation Search -- At The Intersection Of Networks And Highly Interactive Online Games -- Wayfinding in Social Networks.</P>.
Physical Description: XX, 462p. 286 illus., 143 illus. in color. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-765-3
Publication Date: 2010.


Title: Algorithms for Next Generation Networks edited by Graham Cormode, Marina Thottan.
Computer Communications and Networks,
Computer communications and networks,

Author: Cormode, Graham.
Thottan, Marina.
SpringerLink (Online service)

General Notes: <P>Design for Optimizability.-&nbsp; Valiant Load-Balancing -- Geometric Capacity Provisioning for Wavelength-Switched WDM Networks -- Spectrum and Interference Management in Next-Generation Wireless Networks -- Cross-layer Capacity Estimation and Throughput Maximization in Wireless Networks -- Resource Allocation Algorithms for the Next Generation Cellular Networks -- Ethernet Based Services for Next Generation Networks -- Overlay Networks.-&nbsp; Hash-Based Techniques for High-Speed Packet Processing -- Fast Packet Pattern Matching Algorithms -- Anomaly Detection Approaches for Communication Networks -- Model-Based Anomaly Detection for A Transparent Optical Transmission System -- In-Network Monitoring -- Algebraic Approaches for Scalable End-to-End Monitoring and Diagnosis -- Network Coding and its Applications in Communication Networks -- Next Generation Search -- At The Intersection Of Networks And Highly Interactive Online Games -- Wayfinding in Social Networks.</P>.
<P>With the dawn of this new century, we are now on the verge of expanding the notion of what we mean to communicate. A new generation of "netizens" are poised to leverage the Internet for a myriad different applications that we have not envisioned thus far. This will require that the Internet be flexible and adapt to accommodate the requirements of next generation applications. </P> <P></P> <P>This important and timely volume presents a comprehensive survey of the algorithms and methodologies presently used in the design and deployment of the Internet. Issues of network design, network operations and management, and emerging applications are discussed by a collection of experts on the algorithmic foundations of the Internet. Covering topics at the intersection of algorithms and networking, the book builds a complete picture of the current state of research on next generation networks and the challenges for the years ahead.</P> <P></P> <P><STRONG>Topics and features</STRONG></P> <P></P> <P>* Contains a Foreword by Charles R. Kalmanek, and contributions from leading researchers in the field</P> <P></P> <P>* Outlines the goals for optimization in network design, considering optimizability of protocols and the optimum placement of network functionality, and presenting the idea of Valiant load balancing</P> <P></P> <P>* Investigates the influence of physical network characteristics in the design of robust network services, covering algorithms used for optimal capacity provisioning in optical networks, spectrum management in wireless networks, cross-layer algorithms and resource allocation problems in cellular networks</P> <P></P> <P>* Explores algorithms for overlay networks which consider the interactions of different overlay networks and take into account the coexistence of underlay services in the basic network infrastructure</P> <P></P> <P>* Examines the challenge of processing packets at high speeds, surveying Hash-based techniques for high speed packet processing and fast packet pattern matching algorithms</P> <P></P> <P>* Discusses the issue of network management in the face of ever increasing heterogeneity in applications, surveying anomaly detection approaches and network monitoring </P> <P></P> <P>* Reviews the algorithmic techniques behind emerging applications, surveying the evolution of Internet search applications, online gaming and social networking</P> <P></P> <P>Promoting a thorough understanding of the algorithms used by the Internet today as the critical basis for the development of new algorithms that will form the future Internet, this essential text will be of interest to a broad readership – from graduate students to researchers in data networking.</P> <P></P> <P><STRONG>Dr. Graham Cormode </STRONG>is a Technical Specialist at AT&amp;T Labs Research. <STRONG>Dr. Marina Thottan </STRONG>is a Member of Technical Staff at Bell Labs Research.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848827653
Subject: Computer science.
Computer network architectures.
Computer Communication Networks.
Computer science.
Computer Communication Networks.
Computer Systems Organization and Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Design for Optimizability.-&nbsp; Valiant Load-Balancing -- Geometric Capacity Provisioning for Wavelength-Switched WDM Networks -- Spectrum and Interference Management in Next-Generation Wireless Networks -- Cross-layer Capacity Estimation and Throughput Maximization in Wireless Networks -- Resource Allocation Algorithms for the Next Generation Cellular Networks -- Ethernet Based Services for Next Generation Networks -- Overlay Networks.-&nbsp; Hash-Based Techniques for High-Speed Packet Processing -- Fast Packet Pattern Matching Algorithms -- Anomaly Detection Approaches for Communication Networks -- Model-Based Anomaly Detection for A Transparent Optical Transmission System -- In-Network Monitoring -- Algebraic Approaches for Scalable End-to-End Monitoring and Diagnosis -- Network Coding and its Applications in Communication Networks -- Next Generation Search -- At The Intersection Of Networks And Highly Interactive Online Games -- Wayfinding in Social Networks.</P>.
Physical Description: XX, 462p. 286 illus., 143 illus. in color. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-765-3
Publication Date: 2010.


Title: Application and Multidisciplinary Aspects of Wireless Sensor Networks Concepts, Integration, and Case Studies / edited by Liljana Gavrilovska, Srdjan Krco, Veljko Milutinovic, Ivan Stojmenovic, Roman Trobec.
Computer Communications and Networks,
Computer communications and networks,

Author: Gavrilovska, Liljana.
Krco, Srdjan.
Milutinovic, Veljko.
Stojmenovic, Ivan.
Trobec, Roman.
SpringerLink (Online service)

General Notes: Intoduction: A Bird’s Eye View of Wireless Sensor Networks -- PART I: BASIC ISSUES -- Sensors -- Software Issues -- Position-Based Routing Protocols -- PART II: MULTIDISCIPLINARY ISSUES -- Sensor Networks Integration -- Mobility Aspects in WSN -- Modelling for Georouting in Multihop Wireless Networks -- Medical Applications of WSNs -- Optimized Placing of ECG Electrodes in WSN Applications -- Vehicular Sensor Networks: General Aspects and Implementation Issues -- PART III: CASE STUDIES -- FEEIT WSN Testbed: Effective System for Providing Emergency Situations’ Prevention and Surveillance -- ETF WSN Testbed: Practical Health Enhancing Application of WSNs -- PART IV: BIRDS OF A FEATHER -- Ubiquitous Sensor Networks -- eMuseum -- The PAR Logistics Solver Problem.
<p>It is a general trend in computing that computers are becoming ever smaller and more interconnected, and sensor networks - large networks of small, simple devices - represent a logical extreme of this trend. Wireless sensor networks (WSNs) are attracting an increasing degree of research interest, with a growing number of industrial applications starting to emerge. Two of these applications, personal health monitoring and emergency/disaster recovery, are the focus of the <em>European Commission project ProSense: Promote, Mobilize, Reinforce and Integrate Wireless Sensor Networking Research and Researchers</em>.</p> <p>This hands-on, useful introduction to WSN systems development presents broad coverage of topics in the field, contributed by researchers involved in the <em>ProSense</em> project. It emphasises the practical knowledge required for the successful implementation of WSNs. The first part of the work covers basic issues of sensors, software, and position-based routing protocols. Part Two focuses on multidisciplinary issues, including sensor network integration, mobility aspects, geo-routing, medical applications, and vehicular sensor networks. The remaining two parts present case studies and further applications.</p> <p><strong>Topics and features:</strong></p> <ul> <li>Begins with a Foreword by the Nobel Laurate Professor Martin Perl, of Stanford University </li> <li>Presents a broad overview of WSN technology, including an introduction to sensor and sensing technologies </li> <li>Investigates real-world applications of WSN systems in medical and vehicular sensor networks </li> <li>Contains an extensive section on case studies, providing details of the development of a number of WSN applications </li> <li>Discusses frameworks for WSN systems integration, through which WSN technology will become fundamental to the Future Internet concept </li> </ul> <p>Providing holistic coverage of WSN technology, this text/reference will help graduate students of computer science, electrical engineering and telecommunications toward mastering the specific domains of this emerging area. The book will also be a valuable resource for researchers and practitioners interested in entering or exploring the field.</p> <p><strong>Dr. Liljana Gavrilovska </strong>is a professor at the Faculty of Electrical Engineering and Information Technologies of the Ss. Cyril and Methodius University in Skopje, Macedonia.<strong> Dr. Srdjan Krco</strong> is a senior researcher at the Ericsson Ireland Research Centre. <strong>Dr. Veljko M. Milutinovic</strong>, FIEEE, is a professor at the Department of Computer Engineering of the University of Belgrade, Serbia. <strong>Dr. Ivan Stojmenovic</strong> is a professor at the School of Information Technology and Engineering of the University of Ottawa, Canada. <strong>Dr. Roman Trobec </strong>is an associate professor at the Department of Communication Systems of the Jožef Stefan Institute, Slovenia.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781849965101
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Intoduction: A Bird’s Eye View of Wireless Sensor Networks -- PART I: BASIC ISSUES -- Sensors -- Software Issues -- Position-Based Routing Protocols -- PART II: MULTIDISCIPLINARY ISSUES -- Sensor Networks Integration -- Mobility Aspects in WSN -- Modelling for Georouting in Multihop Wireless Networks -- Medical Applications of WSNs -- Optimized Placing of ECG Electrodes in WSN Applications -- Vehicular Sensor Networks: General Aspects and Implementation Issues -- PART III: CASE STUDIES -- FEEIT WSN Testbed: Effective System for Providing Emergency Situations’ Prevention and Surveillance -- ETF WSN Testbed: Practical Health Enhancing Application of WSNs -- PART IV: BIRDS OF A FEATHER -- Ubiquitous Sensor Networks -- eMuseum -- The PAR Logistics Solver Problem.
Physical Description: X, 282 p. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84996-510-1
Publication Date: 2011.


Title: Application and Multidisciplinary Aspects of Wireless Sensor Networks Concepts, Integration, and Case Studies / edited by Liljana Gavrilovska, Srdjan Krco, Veljko Milutinovic, Ivan Stojmenovic, Roman Trobec.
Computer Communications and Networks,
Computer communications and networks,

Author: Gavrilovska, Liljana.
Krco, Srdjan.
Milutinovic, Veljko.
Stojmenovic, Ivan.
Trobec, Roman.
SpringerLink (Online service)

General Notes: Intoduction: A Bird’s Eye View of Wireless Sensor Networks -- PART I: BASIC ISSUES -- Sensors -- Software Issues -- Position-Based Routing Protocols -- PART II: MULTIDISCIPLINARY ISSUES -- Sensor Networks Integration -- Mobility Aspects in WSN -- Modelling for Georouting in Multihop Wireless Networks -- Medical Applications of WSNs -- Optimized Placing of ECG Electrodes in WSN Applications -- Vehicular Sensor Networks: General Aspects and Implementation Issues -- PART III: CASE STUDIES -- FEEIT WSN Testbed: Effective System for Providing Emergency Situations’ Prevention and Surveillance -- ETF WSN Testbed: Practical Health Enhancing Application of WSNs -- PART IV: BIRDS OF A FEATHER -- Ubiquitous Sensor Networks -- eMuseum -- The PAR Logistics Solver Problem.
<p>It is a general trend in computing that computers are becoming ever smaller and more interconnected, and sensor networks - large networks of small, simple devices - represent a logical extreme of this trend. Wireless sensor networks (WSNs) are attracting an increasing degree of research interest, with a growing number of industrial applications starting to emerge. Two of these applications, personal health monitoring and emergency/disaster recovery, are the focus of the <em>European Commission project ProSense: Promote, Mobilize, Reinforce and Integrate Wireless Sensor Networking Research and Researchers</em>.</p> <p>This hands-on, useful introduction to WSN systems development presents broad coverage of topics in the field, contributed by researchers involved in the <em>ProSense</em> project. It emphasises the practical knowledge required for the successful implementation of WSNs. The first part of the work covers basic issues of sensors, software, and position-based routing protocols. Part Two focuses on multidisciplinary issues, including sensor network integration, mobility aspects, geo-routing, medical applications, and vehicular sensor networks. The remaining two parts present case studies and further applications.</p> <p><strong>Topics and features:</strong></p> <ul> <li>Begins with a Foreword by the Nobel Laurate Professor Martin Perl, of Stanford University </li> <li>Presents a broad overview of WSN technology, including an introduction to sensor and sensing technologies </li> <li>Investigates real-world applications of WSN systems in medical and vehicular sensor networks </li> <li>Contains an extensive section on case studies, providing details of the development of a number of WSN applications </li> <li>Discusses frameworks for WSN systems integration, through which WSN technology will become fundamental to the Future Internet concept </li> </ul> <p>Providing holistic coverage of WSN technology, this text/reference will help graduate students of computer science, electrical engineering and telecommunications toward mastering the specific domains of this emerging area. The book will also be a valuable resource for researchers and practitioners interested in entering or exploring the field.</p> <p><strong>Dr. Liljana Gavrilovska </strong>is a professor at the Faculty of Electrical Engineering and Information Technologies of the Ss. Cyril and Methodius University in Skopje, Macedonia.<strong> Dr. Srdjan Krco</strong> is a senior researcher at the Ericsson Ireland Research Centre. <strong>Dr. Veljko M. Milutinovic</strong>, FIEEE, is a professor at the Department of Computer Engineering of the University of Belgrade, Serbia. <strong>Dr. Ivan Stojmenovic</strong> is a professor at the School of Information Technology and Engineering of the University of Ottawa, Canada. <strong>Dr. Roman Trobec </strong>is an associate professor at the Department of Communication Systems of the Jožef Stefan Institute, Slovenia.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781849965101
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Intoduction: A Bird’s Eye View of Wireless Sensor Networks -- PART I: BASIC ISSUES -- Sensors -- Software Issues -- Position-Based Routing Protocols -- PART II: MULTIDISCIPLINARY ISSUES -- Sensor Networks Integration -- Mobility Aspects in WSN -- Modelling for Georouting in Multihop Wireless Networks -- Medical Applications of WSNs -- Optimized Placing of ECG Electrodes in WSN Applications -- Vehicular Sensor Networks: General Aspects and Implementation Issues -- PART III: CASE STUDIES -- FEEIT WSN Testbed: Effective System for Providing Emergency Situations’ Prevention and Surveillance -- ETF WSN Testbed: Practical Health Enhancing Application of WSNs -- PART IV: BIRDS OF A FEATHER -- Ubiquitous Sensor Networks -- eMuseum -- The PAR Logistics Solver Problem.
Physical Description: X, 282 p. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84996-510-1
Publication Date: 2011.


Title: Guide to Wireless Mesh Networks edited by Sudip Misra, Subhas Chandra Misra, Isaac Woungang.
Computer Communications and Networks,
Computer communications and networks,

Author: Misra, Sudip.
Misra, Subhas Chandra.
Woungang, Isaac.
SpringerLink (Online service)

General Notes: <P>From the contents</P> <P>Journey from Mobile Ad Hoc Networks to Wireless Mesh Networks -- Medium Access Control in Wireless mesh Networks -- Hierarchical and QoS-aware Routing in Multi-hop Wireless Mesh Networks -- Stabilizing Interference-free Slot Assignment for Wireless Mesh Networks -- Channel Assignment Techniques for 802.11 Based Multi-radio Wireless Mesh Networks -- Routing, Interface Assignment and Related Cross-layer Issues in Multi-radio Wireless Mesh Networks -- Wireless mesh Network Routing Under Uncertain Demands -- Routing Metrics for Wireless Mesh Networks -- Reliable Transport in Multi-hop Wireless Mesh Networks -- Transport Protocols for Wireless Mesh Networks -- Congestion Control in Wireless Mesh Networks -- Wireless Mesh Networks Based Multi-Network Convergence and Security Access -- Scalability in Wireless Mesh Networks -- Mobility Management in Wireless Mesh Networks -- Low Latency in Wireless Mesh Networks -- WiMAX Metro Area Mesh Networks -- Scheduling and Call Admission Control</P>.
<P>Wireless communication technologies continue to undergo rapid advancement. The attractiveness of Wireless Mesh Networks (WMN)s, in general, can be attributed to their characteristics: the ability to dynamically self-organize and self-configure, coupled with the ability to maintain mesh connectivity, leads in effect to low set-up/installation costs, simpler maintenance tasks, and service coverage with high reliability and fault-tolerance. As a result, WMNs have found many useful applications in a broad range of domains.</P> <P></P> <P>WMNs represent a key technology for future generation wireless networks, and this broad-ranging and comprehensive guidebook presents new ideas and results from research to address the challenges ahead. This unique resource describes all the fundamental key topics and covers both the important core and specialized issues in the field. Each chapter is written by topical area experts, with the first chapters devoted to the basics of WMNs and subsequent ones dealing with some of the more specialist topics, such as the WiMAX metro area mesh networks and the symbiosis of cognitive radio with WMNs.</P> <P><STRONG>Features:</STRONG></P> <P>• Provides an accessible, comprehensive overview of the state-of-the-art technology of Wireless Mesh Networks</P> <P>• Includes reader-friendly discussions for practitioners, directions for future research, helpful lists of terms and definitions, and summary questions within each chapter </P> <P>• Offers a set of questions to help readers assess their understanding of the various concepts at the end of each chapter</P> <P>• Presents insight into the practical significance of these topics in real-world scenarios</P> <P>• Designed, in structure and content, to aid the learning process with the intention of making the book useful at all learning levels</P> <P>• Supplies supportive presentation PowerPoint slides and solutions to aid lecturers at www.springer.com/978-1-84800-908-0</P> <P></P> <P>With contributions by some of the most prominent researchers in the field today, this book will be an invaluable reference/text to WMNs for researchers and practitioners. In addition, its pedagogical tools can make it eminently suitable as a textbook for graduate students wishing to learn more about the topic.</P> <P><STRONG>Key Topics:</STRONG></P> <P>WMNs and MANETs</P> <P>Medium Access</P> <P>Routing and Channel Assignment</P> <P>Routing Metrics</P> <P>Congestion and Transport Layer Issues</P> <P>Multi-network Convergence and Scalability</P> <P>Mobility</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848009097
Subject: Computer science.
Computer network architectures.
Computer Communication Networks.
Telecommunication.
Computer science.
Computer Communication Networks.
Communications Engineering, Networks.
Computer Systems Organization and Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>From the contents</P> <P>Journey from Mobile Ad Hoc Networks to Wireless Mesh Networks -- Medium Access Control in Wireless mesh Networks -- Hierarchical and QoS-aware Routing in Multi-hop Wireless Mesh Networks -- Stabilizing Interference-free Slot Assignment for Wireless Mesh Networks -- Channel Assignment Techniques for 802.11 Based Multi-radio Wireless Mesh Networks -- Routing, Interface Assignment and Related Cross-layer Issues in Multi-radio Wireless Mesh Networks -- Wireless mesh Network Routing Under Uncertain Demands -- Routing Metrics for Wireless Mesh Networks -- Reliable Transport in Multi-hop Wireless Mesh Networks -- Transport Protocols for Wireless Mesh Networks -- Congestion Control in Wireless Mesh Networks -- Wireless Mesh Networks Based Multi-Network Convergence and Security Access -- Scalability in Wireless Mesh Networks -- Mobility Management in Wireless Mesh Networks -- Low Latency in Wireless Mesh Networks -- WiMAX Metro Area Mesh Networks -- Scheduling and Call Admission Control</P>.
Physical Description: digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84800-909-7
Publication Date: 2009.


Title: Guide to Wireless Mesh Networks edited by Sudip Misra, Subhas Chandra Misra, Isaac Woungang.
Computer Communications and Networks,
Computer communications and networks,

Author: Misra, Sudip.
Misra, Subhas Chandra.
Woungang, Isaac.
SpringerLink (Online service)

General Notes: <P>From the contents</P> <P>Journey from Mobile Ad Hoc Networks to Wireless Mesh Networks -- Medium Access Control in Wireless mesh Networks -- Hierarchical and QoS-aware Routing in Multi-hop Wireless Mesh Networks -- Stabilizing Interference-free Slot Assignment for Wireless Mesh Networks -- Channel Assignment Techniques for 802.11 Based Multi-radio Wireless Mesh Networks -- Routing, Interface Assignment and Related Cross-layer Issues in Multi-radio Wireless Mesh Networks -- Wireless mesh Network Routing Under Uncertain Demands -- Routing Metrics for Wireless Mesh Networks -- Reliable Transport in Multi-hop Wireless Mesh Networks -- Transport Protocols for Wireless Mesh Networks -- Congestion Control in Wireless Mesh Networks -- Wireless Mesh Networks Based Multi-Network Convergence and Security Access -- Scalability in Wireless Mesh Networks -- Mobility Management in Wireless Mesh Networks -- Low Latency in Wireless Mesh Networks -- WiMAX Metro Area Mesh Networks -- Scheduling and Call Admission Control</P>.
<P>Wireless communication technologies continue to undergo rapid advancement. The attractiveness of Wireless Mesh Networks (WMN)s, in general, can be attributed to their characteristics: the ability to dynamically self-organize and self-configure, coupled with the ability to maintain mesh connectivity, leads in effect to low set-up/installation costs, simpler maintenance tasks, and service coverage with high reliability and fault-tolerance. As a result, WMNs have found many useful applications in a broad range of domains.</P> <P></P> <P>WMNs represent a key technology for future generation wireless networks, and this broad-ranging and comprehensive guidebook presents new ideas and results from research to address the challenges ahead. This unique resource describes all the fundamental key topics and covers both the important core and specialized issues in the field. Each chapter is written by topical area experts, with the first chapters devoted to the basics of WMNs and subsequent ones dealing with some of the more specialist topics, such as the WiMAX metro area mesh networks and the symbiosis of cognitive radio with WMNs.</P> <P><STRONG>Features:</STRONG></P> <P>• Provides an accessible, comprehensive overview of the state-of-the-art technology of Wireless Mesh Networks</P> <P>• Includes reader-friendly discussions for practitioners, directions for future research, helpful lists of terms and definitions, and summary questions within each chapter </P> <P>• Offers a set of questions to help readers assess their understanding of the various concepts at the end of each chapter</P> <P>• Presents insight into the practical significance of these topics in real-world scenarios</P> <P>• Designed, in structure and content, to aid the learning process with the intention of making the book useful at all learning levels</P> <P>• Supplies supportive presentation PowerPoint slides and solutions to aid lecturers at www.springer.com/978-1-84800-908-0</P> <P></P> <P>With contributions by some of the most prominent researchers in the field today, this book will be an invaluable reference/text to WMNs for researchers and practitioners. In addition, its pedagogical tools can make it eminently suitable as a textbook for graduate students wishing to learn more about the topic.</P> <P><STRONG>Key Topics:</STRONG></P> <P>WMNs and MANETs</P> <P>Medium Access</P> <P>Routing and Channel Assignment</P> <P>Routing Metrics</P> <P>Congestion and Transport Layer Issues</P> <P>Multi-network Convergence and Scalability</P> <P>Mobility</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848009097
Subject: Computer science.
Computer network architectures.
Computer Communication Networks.
Telecommunication.
Computer science.
Computer Communication Networks.
Communications Engineering, Networks.
Computer Systems Organization and Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>From the contents</P> <P>Journey from Mobile Ad Hoc Networks to Wireless Mesh Networks -- Medium Access Control in Wireless mesh Networks -- Hierarchical and QoS-aware Routing in Multi-hop Wireless Mesh Networks -- Stabilizing Interference-free Slot Assignment for Wireless Mesh Networks -- Channel Assignment Techniques for 802.11 Based Multi-radio Wireless Mesh Networks -- Routing, Interface Assignment and Related Cross-layer Issues in Multi-radio Wireless Mesh Networks -- Wireless mesh Network Routing Under Uncertain Demands -- Routing Metrics for Wireless Mesh Networks -- Reliable Transport in Multi-hop Wireless Mesh Networks -- Transport Protocols for Wireless Mesh Networks -- Congestion Control in Wireless Mesh Networks -- Wireless Mesh Networks Based Multi-Network Convergence and Security Access -- Scalability in Wireless Mesh Networks -- Mobility Management in Wireless Mesh Networks -- Low Latency in Wireless Mesh Networks -- WiMAX Metro Area Mesh Networks -- Scheduling and Call Admission Control</P>.
Physical Description: digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84800-909-7
Publication Date: 2009.


Title: Guide to Reliable Internet Services and Applications edited by Charles R. Kalmanek, Sudip Misra, Yang (Richard) Yang.
Computer Communications and Networks,
Computer communications and networks,

Author: Kalmanek, Charles R.
Misra, Sudip.
Yang, Yang (Richard).
SpringerLink (Online service)

General Notes: <P>Part I: Introduction and Reliable Network Design -- Building Reliable Networks and Networked Application Services -- Structural Overview of ISP Networks -- Part II: Reliability Modeling and Network Planning -- Reliability Metrics for Routers in IP Networks -- Network Performability Evaluation -- Robust Network Planning -- Part III: Inter-domain Reliability and Overlay Networks -- Inter-domain Routing and Reliability -- Overlay Networking and Resiliency -- Part IV: Configuration Management -- Network Configuration Management -- Network Configuration Validation -- Part V: Network Measurement -- Measurement of Data Plane Reliability and Performance -- Measurement of Control Plane Reliability and Performance -- Part VI: Network and Security Management, and Disaster Preparedness -- Network Management -- Network Security -- Disaster Preparedness and Resiliency -- Part VII: Reliable Application Services -- Building Large-scale, Reliable Network Applications -- Capacity and Performance Engineering for Networked Application Servers.</P>.
<P>The Internet is a critical infrastructure supporting our information-based society. Our dependence on this infrastructure is similar to our dependence on the world's power grids and global transportation systems. Failures of the network infrastructure or major applications running on it can have an enormous financial and social cost, with serious consequences to the organizations and consumers that depend on these services. </P> <P>Supporting reliable networks and networked application services involves some of the most complex engineering and operational challenges that are dealt with in any industry. This unique and valuable guide addresses the challenges faced by service providers and the approaches they use to deliver reliable services to their users. The book offers a systematic, inter-disciplinary approach and coverage of practical problems arising in real, operational deployments. Leading practitioners and researchers present their unique perspectives on the subject matter, and provide "best practices" to help translate ideas into practice. </P> <P><STRONG>Topics and features:</STRONG></P> <UL> <P> <LI>Introduces the challenges of building reliable networks and services, presenting an overview of the structure of a large ISP backbone network</LI> <P></P> <P> <LI>Examines network reliability modeling and network planning, covering router elements and their failure modes, and providing a theoretical grounding in performance and reliability modeling</LI> <P></P> <P> <LI>Investigates inter-domain reliability and overlay networks, presenting existing solutions and possible future research directions, and reviewing how overlay applications can increase network resilience</LI> <P></P> <P> <LI>Explores the critical function of network configuration management, and considers auditing from the perspective of bottom-up, network-wide configuration validation</LI> <P></P> <P> <LI>Discusses network measurement, with a focus on reliability and performance monitoring, covering both data-plane and control-plane measurements</LI> <P></P></UL> <UL> <LI>Covers network management systems and the tasks involved in supporting day-to-day operations of an IP network, including fault diagnosis, trouble-shooting, security management, and disaster recovery</LI> <P> <LI>Presents an approach to the design and development of reliable network application software, and provides a comprehensive overview of server capacity and performance engineering</LI> <P></P></UL> <P>This comprehensive text/reference on reliable Internet services and applications is suitable for an advanced undergraduate or graduate course, and will be of value to researchers seeking to understand the challenges faced by service providers and to identify areas that are ripe for research. The guidebook will be particularly useful to practitioners who want to broaden their understanding of the field, and/or to deepen their knowledge of the fundamentals.</P> <P><STRONG>Charles R. Kalmanek</STRONG> is Vice President of Networking and Services Research in AT&amp;T Labs. <STRONG>Dr. Sudip Misra</STRONG> is an Assistant Professor at the School of IT, Indian Institute of Technology Kharagpur. <STRONG>Dr. Y. Richard Yang</STRONG> is an Associate Professor of Computer Science and Electrical Engineering at Yale University. </P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848828285
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Part I: Introduction and Reliable Network Design -- Building Reliable Networks and Networked Application Services -- Structural Overview of ISP Networks -- Part II: Reliability Modeling and Network Planning -- Reliability Metrics for Routers in IP Networks -- Network Performability Evaluation -- Robust Network Planning -- Part III: Inter-domain Reliability and Overlay Networks -- Inter-domain Routing and Reliability -- Overlay Networking and Resiliency -- Part IV: Configuration Management -- Network Configuration Management -- Network Configuration Validation -- Part V: Network Measurement -- Measurement of Data Plane Reliability and Performance -- Measurement of Control Plane Reliability and Performance -- Part VI: Network and Security Management, and Disaster Preparedness -- Network Management -- Network Security -- Disaster Preparedness and Resiliency -- Part VII: Reliable Application Services -- Building Large-scale, Reliable Network Applications -- Capacity and Performance Engineering for Networked Application Servers.</P>.
Physical Description: VIII, 626p. 336 illus., 168 illus. in color. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-828-5
Publication Date: 2010.


Title: Guide to Reliable Internet Services and Applications edited by Charles R. Kalmanek, Sudip Misra, Yang (Richard) Yang.
Computer Communications and Networks,
Computer communications and networks,

Author: Kalmanek, Charles R.
Misra, Sudip.
Yang, Yang (Richard).
SpringerLink (Online service)

General Notes: <P>Part I: Introduction and Reliable Network Design -- Building Reliable Networks and Networked Application Services -- Structural Overview of ISP Networks -- Part II: Reliability Modeling and Network Planning -- Reliability Metrics for Routers in IP Networks -- Network Performability Evaluation -- Robust Network Planning -- Part III: Inter-domain Reliability and Overlay Networks -- Inter-domain Routing and Reliability -- Overlay Networking and Resiliency -- Part IV: Configuration Management -- Network Configuration Management -- Network Configuration Validation -- Part V: Network Measurement -- Measurement of Data Plane Reliability and Performance -- Measurement of Control Plane Reliability and Performance -- Part VI: Network and Security Management, and Disaster Preparedness -- Network Management -- Network Security -- Disaster Preparedness and Resiliency -- Part VII: Reliable Application Services -- Building Large-scale, Reliable Network Applications -- Capacity and Performance Engineering for Networked Application Servers.</P>.
<P>The Internet is a critical infrastructure supporting our information-based society. Our dependence on this infrastructure is similar to our dependence on the world's power grids and global transportation systems. Failures of the network infrastructure or major applications running on it can have an enormous financial and social cost, with serious consequences to the organizations and consumers that depend on these services. </P> <P>Supporting reliable networks and networked application services involves some of the most complex engineering and operational challenges that are dealt with in any industry. This unique and valuable guide addresses the challenges faced by service providers and the approaches they use to deliver reliable services to their users. The book offers a systematic, inter-disciplinary approach and coverage of practical problems arising in real, operational deployments. Leading practitioners and researchers present their unique perspectives on the subject matter, and provide "best practices" to help translate ideas into practice. </P> <P><STRONG>Topics and features:</STRONG></P> <UL> <P> <LI>Introduces the challenges of building reliable networks and services, presenting an overview of the structure of a large ISP backbone network</LI> <P></P> <P> <LI>Examines network reliability modeling and network planning, covering router elements and their failure modes, and providing a theoretical grounding in performance and reliability modeling</LI> <P></P> <P> <LI>Investigates inter-domain reliability and overlay networks, presenting existing solutions and possible future research directions, and reviewing how overlay applications can increase network resilience</LI> <P></P> <P> <LI>Explores the critical function of network configuration management, and considers auditing from the perspective of bottom-up, network-wide configuration validation</LI> <P></P> <P> <LI>Discusses network measurement, with a focus on reliability and performance monitoring, covering both data-plane and control-plane measurements</LI> <P></P></UL> <UL> <LI>Covers network management systems and the tasks involved in supporting day-to-day operations of an IP network, including fault diagnosis, trouble-shooting, security management, and disaster recovery</LI> <P> <LI>Presents an approach to the design and development of reliable network application software, and provides a comprehensive overview of server capacity and performance engineering</LI> <P></P></UL> <P>This comprehensive text/reference on reliable Internet services and applications is suitable for an advanced undergraduate or graduate course, and will be of value to researchers seeking to understand the challenges faced by service providers and to identify areas that are ripe for research. The guidebook will be particularly useful to practitioners who want to broaden their understanding of the field, and/or to deepen their knowledge of the fundamentals.</P> <P><STRONG>Charles R. Kalmanek</STRONG> is Vice President of Networking and Services Research in AT&amp;T Labs. <STRONG>Dr. Sudip Misra</STRONG> is an Assistant Professor at the School of IT, Indian Institute of Technology Kharagpur. <STRONG>Dr. Y. Richard Yang</STRONG> is an Associate Professor of Computer Science and Electrical Engineering at Yale University. </P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848828285
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Part I: Introduction and Reliable Network Design -- Building Reliable Networks and Networked Application Services -- Structural Overview of ISP Networks -- Part II: Reliability Modeling and Network Planning -- Reliability Metrics for Routers in IP Networks -- Network Performability Evaluation -- Robust Network Planning -- Part III: Inter-domain Reliability and Overlay Networks -- Inter-domain Routing and Reliability -- Overlay Networking and Resiliency -- Part IV: Configuration Management -- Network Configuration Management -- Network Configuration Validation -- Part V: Network Measurement -- Measurement of Data Plane Reliability and Performance -- Measurement of Control Plane Reliability and Performance -- Part VI: Network and Security Management, and Disaster Preparedness -- Network Management -- Network Security -- Disaster Preparedness and Resiliency -- Part VII: Reliable Application Services -- Building Large-scale, Reliable Network Applications -- Capacity and Performance Engineering for Networked Application Servers.</P>.
Physical Description: VIII, 626p. 336 illus., 168 illus. in color. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-828-5
Publication Date: 2010.


Title: Cloud Computing for Enterprise Architectures edited by Zaigham Mahmood, Richard Hill.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham.
Hill, Richard.
SpringerLink (Online service)

General Notes: <p><b>Part I: Concepts and Principles -- </b>Cloud Computing for EA -- EA Fundamentals -- Cloud Computing Business Models -- The Convergence of EA and Cloud Computing -- <b>Part II: Approaches and Frameworks -- </b>Component-Based Development for Cloud Computing Architectures -- Identity and Access Management in Cloud Computing -- A Cloud Architecture for Educational Enterprises: a Case Study in Robotics -- Cloud Computing: an Enabler in Developing Business Models for Global Enterprises -- Using Common Logic to Provide a Semantic EA Framework for Cloud Computing -- <b>Part III: Issues and Challenges -- </b>The Cloud Challenges for Enterprise Architects -- Service Level Agreements in Cloud Computing: Perspectives of Private Consumers and Small-to-Medium Enterprises -- Enterprise HPC in the Clouds -- <b>Part IV: Further Research and Studies -- </b>Cloud Computing and the Emerging Market -- Fair Non-Repudiation Framework for Cloud Storage -- A Cross-Enterprise Approach to Detecting Information Leakage without Leaking Information.</p>.
<p>An understanding of cloud technology innovation is becoming increasingly essential for IT practitioners, as entrepreneurs realise the business requirements fulfilment potential of an enterprise perspective of cloud computing.</p><p>This important text provides a single point of reference for state-of-the-art cloud computing design and implementation techniques. The book examines cloud computing from the perspective of enterprise architecture, asking the question; how do we realize new business potential with our existing enterprises? Divided into four parts covering all aspects of cloud computing for enterprise architectures, the text introduces fundamental concepts and principles, examines approaches and frameworks for the adoption of cloud computing, explores existing issues and challenges, and presents future directions and ideas for further research.</p><p><b>Topics and features:</b></p><ul><li>With a Foreword by Thomas Erl</li><li>Contains contributions from an international selection of preeminent experts</li><li>Presents the state-of-the-art in enterprise architecture approaches with respect to cloud computing models, frameworks, technologies, and applications</li><li>Discusses potential research directions, and technologies to facilitate the realization of emerging business models through enterprise architecture approaches</li><li>Provides relevant theoretical frameworks, and the latest empirical research findings</li></ul><p>Collecting together the latest theoretical, practical and evaluative work in the field, this authoritative reference can also be used as a primer for self-study. As such, it will appeal to a broad audience from enterprise architects and application developers, to business leaders and IT infrastructure managers, in addition to students and researchers.</p><p><b>Dr. Zaigham Mahmood</b> is Reader in Applied Computing and Assistant Head of the Distributed and Intelligent Systems Research Group at the School of Computing in the University of Derby, UK. <b>Dr. Richard Hill</b> is Head of Subject (Computing and Mathematics) and Reader in Intelligent Systems at the School of Computing in the University of Derby, UK.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781447122364
Subject: Computer science.
Computer Communication Networks.
Management information systems.
Computer science.
Computer Communication Networks.
Business information systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <p><b>Part I: Concepts and Principles -- </b>Cloud Computing for EA -- EA Fundamentals -- Cloud Computing Business Models -- The Convergence of EA and Cloud Computing -- <b>Part II: Approaches and Frameworks -- </b>Component-Based Development for Cloud Computing Architectures -- Identity and Access Management in Cloud Computing -- A Cloud Architecture for Educational Enterprises: a Case Study in Robotics -- Cloud Computing: an Enabler in Developing Business Models for Global Enterprises -- Using Common Logic to Provide a Semantic EA Framework for Cloud Computing -- <b>Part III: Issues and Challenges -- </b>The Cloud Challenges for Enterprise Architects -- Service Level Agreements in Cloud Computing: Perspectives of Private Consumers and Small-to-Medium Enterprises -- Enterprise HPC in the Clouds -- <b>Part IV: Further Research and Studies -- </b>Cloud Computing and the Emerging Market -- Fair Non-Repudiation Framework for Cloud Storage -- A Cross-Enterprise Approach to Detecting Information Leakage without Leaking Information.</p>.
Physical Description: XVI, 327p. 85 illus. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-2236-4
Publication Date: 2011.


Title: Cloud Computing for Enterprise Architectures edited by Zaigham Mahmood, Richard Hill.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham.
Hill, Richard.
SpringerLink (Online service)

General Notes: <p><b>Part I: Concepts and Principles -- </b>Cloud Computing for EA -- EA Fundamentals -- Cloud Computing Business Models -- The Convergence of EA and Cloud Computing -- <b>Part II: Approaches and Frameworks -- </b>Component-Based Development for Cloud Computing Architectures -- Identity and Access Management in Cloud Computing -- A Cloud Architecture for Educational Enterprises: a Case Study in Robotics -- Cloud Computing: an Enabler in Developing Business Models for Global Enterprises -- Using Common Logic to Provide a Semantic EA Framework for Cloud Computing -- <b>Part III: Issues and Challenges -- </b>The Cloud Challenges for Enterprise Architects -- Service Level Agreements in Cloud Computing: Perspectives of Private Consumers and Small-to-Medium Enterprises -- Enterprise HPC in the Clouds -- <b>Part IV: Further Research and Studies -- </b>Cloud Computing and the Emerging Market -- Fair Non-Repudiation Framework for Cloud Storage -- A Cross-Enterprise Approach to Detecting Information Leakage without Leaking Information.</p>.
<p>An understanding of cloud technology innovation is becoming increasingly essential for IT practitioners, as entrepreneurs realise the business requirements fulfilment potential of an enterprise perspective of cloud computing.</p><p>This important text provides a single point of reference for state-of-the-art cloud computing design and implementation techniques. The book examines cloud computing from the perspective of enterprise architecture, asking the question; how do we realize new business potential with our existing enterprises? Divided into four parts covering all aspects of cloud computing for enterprise architectures, the text introduces fundamental concepts and principles, examines approaches and frameworks for the adoption of cloud computing, explores existing issues and challenges, and presents future directions and ideas for further research.</p><p><b>Topics and features:</b></p><ul><li>With a Foreword by Thomas Erl</li><li>Contains contributions from an international selection of preeminent experts</li><li>Presents the state-of-the-art in enterprise architecture approaches with respect to cloud computing models, frameworks, technologies, and applications</li><li>Discusses potential research directions, and technologies to facilitate the realization of emerging business models through enterprise architecture approaches</li><li>Provides relevant theoretical frameworks, and the latest empirical research findings</li></ul><p>Collecting together the latest theoretical, practical and evaluative work in the field, this authoritative reference can also be used as a primer for self-study. As such, it will appeal to a broad audience from enterprise architects and application developers, to business leaders and IT infrastructure managers, in addition to students and researchers.</p><p><b>Dr. Zaigham Mahmood</b> is Reader in Applied Computing and Assistant Head of the Distributed and Intelligent Systems Research Group at the School of Computing in the University of Derby, UK. <b>Dr. Richard Hill</b> is Head of Subject (Computing and Mathematics) and Reader in Intelligent Systems at the School of Computing in the University of Derby, UK.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781447122364
Subject: Computer science.
Computer Communication Networks.
Management information systems.
Computer science.
Computer Communication Networks.
Business information systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <p><b>Part I: Concepts and Principles -- </b>Cloud Computing for EA -- EA Fundamentals -- Cloud Computing Business Models -- The Convergence of EA and Cloud Computing -- <b>Part II: Approaches and Frameworks -- </b>Component-Based Development for Cloud Computing Architectures -- Identity and Access Management in Cloud Computing -- A Cloud Architecture for Educational Enterprises: a Case Study in Robotics -- Cloud Computing: an Enabler in Developing Business Models for Global Enterprises -- Using Common Logic to Provide a Semantic EA Framework for Cloud Computing -- <b>Part III: Issues and Challenges -- </b>The Cloud Challenges for Enterprise Architects -- Service Level Agreements in Cloud Computing: Perspectives of Private Consumers and Small-to-Medium Enterprises -- Enterprise HPC in the Clouds -- <b>Part IV: Further Research and Studies -- </b>Cloud Computing and the Emerging Market -- Fair Non-Repudiation Framework for Cloud Storage -- A Cross-Enterprise Approach to Detecting Information Leakage without Leaking Information.</p>.
Physical Description: XVI, 327p. 85 illus. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-2236-4
Publication Date: 2011.


Title: The Essential PIC18® Microcontroller by Sid Katzen.
Computer Communications and Networks,
Computer communications and networks,

Author: Katzen, Sid.
SpringerLink (Online service)

General Notes: Part I: The Fundamentals -- Digital Representation -- Logic Circuitry -- Stored Program Processing -- Part II: The Software -- The PIC18F1220 Microcontroller -- The Instruction Set -- Subroutines and Modules -- Interrupt Handling -- Assembly Language -- High-level Language -- Part III: The Outside World -- The Real World -- One Byte at a Time -- One Bit at a Time -- Time Is of the Essence -- Take the Rough with the Smooth -- To Have and To Hold -- A Case Study.
<p>Microprocessors are the key component of the infrastructure of our 21st-century electronic- and digital information-based society. More than four billion are sold each year for use in 'intelligent' electronic devices; ranging from smart egg-timer through to aircraft management systems.</p> <p>Most of these processors devices appear in the form of highly-integrated microcontrollers, which comprize a core microprocessor together with memory and analog/digital peripheral ports. By using simple cores, these single-chip computers are the cost- and size-effective means of adding the brains to previous dumb widgets; such as the credit card.</p> <p>Using the same winning format as the successful Springer guide, <em>The Quintessential PIC® Microcontroller</em>, this down-to-earth new textbook/guide has been completely rewritten based on the more powerful PIC18 enhanced-range Microchip MCU family. Throughout the book, commercial hardware and software products are used to illustrate the material, as readers are provided real-world in-depth guidance on the design, construction and programming of small, embedded microcontroller-based systems. Suitable for stand-alone usage, the text does not require a prerequisite deep understanding of digital systems.</p> <p><strong>Topics and features:</strong></p> <ul> <li>Uses an in-depth bottom-up approach to the topic of microcontroller design using the Microchip enhanced-range PIC18® microcontroller family as the exemplar</li> <li>Includes fully worked examples and self-assessment questions, with additional support material available on an associated website</li> <li>Provides a standalone module on foundation topics in digital, logic and computer architecture for microcontroller engineering</li> <li>Discusses the hardware aspects of interfacing and interrupt handling, with an emphasis on the integration of hardware and software</li> <li>Covers parallel and serial input/output, timing, analog, and EEPROM data-handling techniques</li> <li>Presents a practical build-and-program case study, as well as illustrating simple testing strategies</li> </ul> <p>This useful text/reference book will be of great value to industrial engineers, hobbyists and people in academia. Students of Electronic Engineering and Computer Science, at both undergraduate and postgraduate level, will also find this an ideal textbook, with many helpful learning tools.</p> <p><strong>Dr. Sid Katzen</strong> is Associate to the School of Engineering, University of Ulster at Jordanstown, Northern Ireland.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781849962292
Subject: Computer science.
Computer Communication Networks.
Electronics.
Telecommunication.
Computer science.
Computer Communication Networks.
Electronics and Microelectronics, Instrumentation.
Communications Engineering, Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: The Fundamentals -- Digital Representation -- Logic Circuitry -- Stored Program Processing -- Part II: The Software -- The PIC18F1220 Microcontroller -- The Instruction Set -- Subroutines and Modules -- Interrupt Handling -- Assembly Language -- High-level Language -- Part III: The Outside World -- The Real World -- One Byte at a Time -- One Bit at a Time -- Time Is of the Essence -- Take the Rough with the Smooth -- To Have and To Hold -- A Case Study.
Physical Description: XII, 612p. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84996-229-2
Publication Date: 2010.


Title: The Essential PIC18® Microcontroller by Sid Katzen.
Computer Communications and Networks,
Computer communications and networks,

Author: Katzen, Sid.
SpringerLink (Online service)

General Notes: Part I: The Fundamentals -- Digital Representation -- Logic Circuitry -- Stored Program Processing -- Part II: The Software -- The PIC18F1220 Microcontroller -- The Instruction Set -- Subroutines and Modules -- Interrupt Handling -- Assembly Language -- High-level Language -- Part III: The Outside World -- The Real World -- One Byte at a Time -- One Bit at a Time -- Time Is of the Essence -- Take the Rough with the Smooth -- To Have and To Hold -- A Case Study.
<p>Microprocessors are the key component of the infrastructure of our 21st-century electronic- and digital information-based society. More than four billion are sold each year for use in 'intelligent' electronic devices; ranging from smart egg-timer through to aircraft management systems.</p> <p>Most of these processors devices appear in the form of highly-integrated microcontrollers, which comprize a core microprocessor together with memory and analog/digital peripheral ports. By using simple cores, these single-chip computers are the cost- and size-effective means of adding the brains to previous dumb widgets; such as the credit card.</p> <p>Using the same winning format as the successful Springer guide, <em>The Quintessential PIC® Microcontroller</em>, this down-to-earth new textbook/guide has been completely rewritten based on the more powerful PIC18 enhanced-range Microchip MCU family. Throughout the book, commercial hardware and software products are used to illustrate the material, as readers are provided real-world in-depth guidance on the design, construction and programming of small, embedded microcontroller-based systems. Suitable for stand-alone usage, the text does not require a prerequisite deep understanding of digital systems.</p> <p><strong>Topics and features:</strong></p> <ul> <li>Uses an in-depth bottom-up approach to the topic of microcontroller design using the Microchip enhanced-range PIC18® microcontroller family as the exemplar</li> <li>Includes fully worked examples and self-assessment questions, with additional support material available on an associated website</li> <li>Provides a standalone module on foundation topics in digital, logic and computer architecture for microcontroller engineering</li> <li>Discusses the hardware aspects of interfacing and interrupt handling, with an emphasis on the integration of hardware and software</li> <li>Covers parallel and serial input/output, timing, analog, and EEPROM data-handling techniques</li> <li>Presents a practical build-and-program case study, as well as illustrating simple testing strategies</li> </ul> <p>This useful text/reference book will be of great value to industrial engineers, hobbyists and people in academia. Students of Electronic Engineering and Computer Science, at both undergraduate and postgraduate level, will also find this an ideal textbook, with many helpful learning tools.</p> <p><strong>Dr. Sid Katzen</strong> is Associate to the School of Engineering, University of Ulster at Jordanstown, Northern Ireland.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781849962292
Subject: Computer science.
Computer Communication Networks.
Electronics.
Telecommunication.
Computer science.
Computer Communication Networks.
Electronics and Microelectronics, Instrumentation.
Communications Engineering, Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: The Fundamentals -- Digital Representation -- Logic Circuitry -- Stored Program Processing -- Part II: The Software -- The PIC18F1220 Microcontroller -- The Instruction Set -- Subroutines and Modules -- Interrupt Handling -- Assembly Language -- High-level Language -- Part III: The Outside World -- The Real World -- One Byte at a Time -- One Bit at a Time -- Time Is of the Essence -- Take the Rough with the Smooth -- To Have and To Hold -- A Case Study.
Physical Description: XII, 612p. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84996-229-2
Publication Date: 2010.


Title: Cloud Computing Principles, Systems and Applications / edited by Nick Antonopoulos, Lee Gillam.
Computer Communications and Networks,
Computer communications and networks,

Author: Antonopoulos, Nick.
Gillam, Lee.
SpringerLink (Online service)

General Notes: Part I: Cloud Base,- Tools and Technologies for Building Clouds -- A Taxonomy, Survey and Issues of Cloud Computing Ecosystems -- Towards a Taxonomy for Cloud Computing from an e-Science Perspective -- Examining Cloud Computing from the Perspective of Grid and Computer-Supported Cooperative Work -- Overview of Cloud Standards -- Part II: Cloud Seeding -- Open and Interoperable Clouds: the Cloud@HomeWay -- A Peer-to-Peer Framework for Supporting MapReduce Applications in Dynamic Cloud Environments -- Enhanced Network Support for Scalable Computing Clouds -- YML-PC: A Reference Architecture Based on Workflow for Building -- Scientific Private Clouds -- An Efficient Framework for Running Applications on Clusters, Grids and Clouds -- Resource Management for Hybrid Grid and Cloud Computing -- Peer-to-Peer Cloud Provisioning: Service Discovery and Load-Balancing -- Mixing Grids and Clouds: High-throughput Science using the Nimrod Tool Family -- Part III: Cloud Breaks -- Cloud Compliance: A Framework for Using Cloud Computing in a Regulated World -- Cloud Computing: Data Confidentiality and Interoperability Challenges -- Security Issues to Cloud Computing -- Securing the Cloud -- Part IV: Cloud Feedback -- Technologies for Enforcement and Distribution of Policy in Cloud Architectures -- The PRISM On-demand Digital Media Cloud -- Cloud Economics: Principles, Costs and Benefits -- Towards Application-Specific Service Level Agreements: Experiments in Clouds and Grids.
<p>Cloud computing continues to emerge as a subject of substantial industrial and academic interest. Although the meaning and scope of "cloud computing" continues to be debated, the current notion of clouds blurs the distinctions between grid services, web services, and data centers, among other areas. Clouds also bring considerations of lowering the cost for relatively bursty applications to the fore.</p> <p><em>Cloud Computing: Principles, Systems and Applications </em>is an essential reference/guide that provides thorough and timely examination of the services, interfaces and types of applications that can be executed on cloud-based systems. The book identifies and highlights state-of-the-art techniques and methods for designing cloud systems, offers balanced coverage of related technologies that collectively contribute towards the realization of cloud computing, and presents mechanisms and schemes for linking clouds to economic activities. With an emphasis on the conceptual and systemic links between cloud computing and other distributed computing approaches, this text also addresses the practical importance of efficiency, scalability, robustness and security as the four cornerstones of quality of service.</p> <p><strong>Topics and features:</strong></p> <ul> <li>Explores the relationship of cloud computing to other distributed computing paradigms, namely peer-to-peer, grids, high performance computing and web services</li> <li>Presents the principles, techniques, protocols and algorithms that can be adapted from other distributed computing paradigms to the development of successful clouds</li> <li>Includes a Foreword by Professor Mark Baker of the University of Reading, UK</li> <li>Examines cloud-practices and applications, and highlights early deployment experiences</li> <li>Elaborates the economic schemes needed for clouds to become viable business models</li> </ul> <p>This book will serve as a comprehensive reference for researchers and students engaged in cloud computing. Professional system architects, technical managers, and IT consultants will also find this unique text a practical guide to the application and delivery of commercial cloud services.</p> <p><strong>Dr. Nick Antonopoulos </strong>is Professor and Head of the School of Computing at the University of Derby, UK. <strong>Dr. Lee Gillam </strong>is a Lecturer in the Department of Computing at the University of Surrey, UK.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781849962414
Subject: Computer science.
Operating systems (Computers).
Computer system performance.
Computer science.
System Performance and Evaluation.
Performance and Reliability.

Series: Computer Communications and Networks, 0
Computer communications and networks, 0

Contents: Part I: Cloud Base,- Tools and Technologies for Building Clouds -- A Taxonomy, Survey and Issues of Cloud Computing Ecosystems -- Towards a Taxonomy for Cloud Computing from an e-Science Perspective -- Examining Cloud Computing from the Perspective of Grid and Computer-Supported Cooperative Work -- Overview of Cloud Standards -- Part II: Cloud Seeding -- Open and Interoperable Clouds: the Cloud@HomeWay -- A Peer-to-Peer Framework for Supporting MapReduce Applications in Dynamic Cloud Environments -- Enhanced Network Support for Scalable Computing Clouds -- YML-PC: A Reference Architecture Based on Workflow for Building -- Scientific Private Clouds -- An Efficient Framework for Running Applications on Clusters, Grids and Clouds -- Resource Management for Hybrid Grid and Cloud Computing -- Peer-to-Peer Cloud Provisioning: Service Discovery and Load-Balancing -- Mixing Grids and Clouds: High-throughput Science using the Nimrod Tool Family -- Part III: Cloud Breaks -- Cloud Compliance: A Framework for Using Cloud Computing in a Regulated World -- Cloud Computing: Data Confidentiality and Interoperability Challenges -- Security Issues to Cloud Computing -- Securing the Cloud -- Part IV: Cloud Feedback -- Technologies for Enforcement and Distribution of Policy in Cloud Architectures -- The PRISM On-demand Digital Media Cloud -- Cloud Economics: Principles, Costs and Benefits -- Towards Application-Specific Service Level Agreements: Experiments in Clouds and Grids.
Physical Description: XVIII, 382 p. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84996-241-4
Publication Date: 2010.


Title: Cloud Computing Principles, Systems and Applications / edited by Nick Antonopoulos, Lee Gillam.
Computer Communications and Networks,
Computer communications and networks,

Author: Antonopoulos, Nick.
Gillam, Lee.
SpringerLink (Online service)

General Notes: Part I: Cloud Base,- Tools and Technologies for Building Clouds -- A Taxonomy, Survey and Issues of Cloud Computing Ecosystems -- Towards a Taxonomy for Cloud Computing from an e-Science Perspective -- Examining Cloud Computing from the Perspective of Grid and Computer-Supported Cooperative Work -- Overview of Cloud Standards -- Part II: Cloud Seeding -- Open and Interoperable Clouds: the Cloud@HomeWay -- A Peer-to-Peer Framework for Supporting MapReduce Applications in Dynamic Cloud Environments -- Enhanced Network Support for Scalable Computing Clouds -- YML-PC: A Reference Architecture Based on Workflow for Building -- Scientific Private Clouds -- An Efficient Framework for Running Applications on Clusters, Grids and Clouds -- Resource Management for Hybrid Grid and Cloud Computing -- Peer-to-Peer Cloud Provisioning: Service Discovery and Load-Balancing -- Mixing Grids and Clouds: High-throughput Science using the Nimrod Tool Family -- Part III: Cloud Breaks -- Cloud Compliance: A Framework for Using Cloud Computing in a Regulated World -- Cloud Computing: Data Confidentiality and Interoperability Challenges -- Security Issues to Cloud Computing -- Securing the Cloud -- Part IV: Cloud Feedback -- Technologies for Enforcement and Distribution of Policy in Cloud Architectures -- The PRISM On-demand Digital Media Cloud -- Cloud Economics: Principles, Costs and Benefits -- Towards Application-Specific Service Level Agreements: Experiments in Clouds and Grids.
<p>Cloud computing continues to emerge as a subject of substantial industrial and academic interest. Although the meaning and scope of "cloud computing" continues to be debated, the current notion of clouds blurs the distinctions between grid services, web services, and data centers, among other areas. Clouds also bring considerations of lowering the cost for relatively bursty applications to the fore.</p> <p><em>Cloud Computing: Principles, Systems and Applications </em>is an essential reference/guide that provides thorough and timely examination of the services, interfaces and types of applications that can be executed on cloud-based systems. The book identifies and highlights state-of-the-art techniques and methods for designing cloud systems, offers balanced coverage of related technologies that collectively contribute towards the realization of cloud computing, and presents mechanisms and schemes for linking clouds to economic activities. With an emphasis on the conceptual and systemic links between cloud computing and other distributed computing approaches, this text also addresses the practical importance of efficiency, scalability, robustness and security as the four cornerstones of quality of service.</p> <p><strong>Topics and features:</strong></p> <ul> <li>Explores the relationship of cloud computing to other distributed computing paradigms, namely peer-to-peer, grids, high performance computing and web services</li> <li>Presents the principles, techniques, protocols and algorithms that can be adapted from other distributed computing paradigms to the development of successful clouds</li> <li>Includes a Foreword by Professor Mark Baker of the University of Reading, UK</li> <li>Examines cloud-practices and applications, and highlights early deployment experiences</li> <li>Elaborates the economic schemes needed for clouds to become viable business models</li> </ul> <p>This book will serve as a comprehensive reference for researchers and students engaged in cloud computing. Professional system architects, technical managers, and IT consultants will also find this unique text a practical guide to the application and delivery of commercial cloud services.</p> <p><strong>Dr. Nick Antonopoulos </strong>is Professor and Head of the School of Computing at the University of Derby, UK. <strong>Dr. Lee Gillam </strong>is a Lecturer in the Department of Computing at the University of Surrey, UK.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781849962414
Subject: Computer science.
Operating systems (Computers).
Computer system performance.
Computer science.
System Performance and Evaluation.
Performance and Reliability.

Series: Computer Communications and Networks, 0
Computer communications and networks, 0

Contents: Part I: Cloud Base,- Tools and Technologies for Building Clouds -- A Taxonomy, Survey and Issues of Cloud Computing Ecosystems -- Towards a Taxonomy for Cloud Computing from an e-Science Perspective -- Examining Cloud Computing from the Perspective of Grid and Computer-Supported Cooperative Work -- Overview of Cloud Standards -- Part II: Cloud Seeding -- Open and Interoperable Clouds: the Cloud@HomeWay -- A Peer-to-Peer Framework for Supporting MapReduce Applications in Dynamic Cloud Environments -- Enhanced Network Support for Scalable Computing Clouds -- YML-PC: A Reference Architecture Based on Workflow for Building -- Scientific Private Clouds -- An Efficient Framework for Running Applications on Clusters, Grids and Clouds -- Resource Management for Hybrid Grid and Cloud Computing -- Peer-to-Peer Cloud Provisioning: Service Discovery and Load-Balancing -- Mixing Grids and Clouds: High-throughput Science using the Nimrod Tool Family -- Part III: Cloud Breaks -- Cloud Compliance: A Framework for Using Cloud Computing in a Regulated World -- Cloud Computing: Data Confidentiality and Interoperability Challenges -- Security Issues to Cloud Computing -- Securing the Cloud -- Part IV: Cloud Feedback -- Technologies for Enforcement and Distribution of Policy in Cloud Architectures -- The PRISM On-demand Digital Media Cloud -- Cloud Economics: Principles, Costs and Benefits -- Towards Application-Specific Service Level Agreements: Experiments in Clouds and Grids.
Physical Description: XVIII, 382 p. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84996-241-4
Publication Date: 2010.


Title: 802.11 Wireless Networks Security and Analysis / by Alan Holt, Chi-Yu Huang.
Computer Communications and Networks,
Computer communications and networks,

Author: Holt, Alan.
Huang, Chi-Yu.
SpringerLink (Online service)

General Notes: Introduction -- Radio Frequencies -- Medium Access Control -- Physical Layer -- Cryptography -- Wireless Security -- Configuring Wireless Networks -- Robust Security Network -- MAC Layer Performance Analysis -- Link Rate Adaptation -- Build a Xen Server -- Initial Configuration of Access-point Controllers.
<p>Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. </p> <p>This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment.</p> <p><strong>Topics and Features:</strong></p> <ul> <li>Presents a practical approach supported by the extensive use of examples and detailed instructions</li> <li>Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks</li> <li>Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple</li> <li>Examines issues of wireless security and describes how to implement a wireless network with enterprise security</li> <li>Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer</li> <li>Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment.</li> </ul> <p>A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking.</p> <p><strong>Dr. Alan Holt</strong> is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text <em>Network Performance Analysis: Using the J Programming Language</em>.</p> <p><strong>Dr. Chi-Yu Huang</strong> works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781849962759
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Radio Frequencies -- Medium Access Control -- Physical Layer -- Cryptography -- Wireless Security -- Configuring Wireless Networks -- Robust Security Network -- MAC Layer Performance Analysis -- Link Rate Adaptation -- Build a Xen Server -- Initial Configuration of Access-point Controllers.
Physical Description: XXI, 212 p. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84996-275-9
Publication Date: 2010.


Title: 802.11 Wireless Networks Security and Analysis / by Alan Holt, Chi-Yu Huang.
Computer Communications and Networks,
Computer communications and networks,

Author: Holt, Alan.
Huang, Chi-Yu.
SpringerLink (Online service)

General Notes: Introduction -- Radio Frequencies -- Medium Access Control -- Physical Layer -- Cryptography -- Wireless Security -- Configuring Wireless Networks -- Robust Security Network -- MAC Layer Performance Analysis -- Link Rate Adaptation -- Build a Xen Server -- Initial Configuration of Access-point Controllers.
<p>Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. </p> <p>This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyse performance in a WLAN environment.</p> <p><strong>Topics and Features:</strong></p> <ul> <li>Presents a practical approach supported by the extensive use of examples and detailed instructions</li> <li>Discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks</li> <li>Provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple</li> <li>Examines issues of wireless security and describes how to implement a wireless network with enterprise security</li> <li>Investigates the medium access control sub-layer, and models for performance analysis of the MAC layer</li> <li>Reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment.</li> </ul> <p>A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking.</p> <p><strong>Dr. Alan Holt</strong> is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text <em>Network Performance Analysis: Using the J Programming Language</em>.</p> <p><strong>Dr. Chi-Yu Huang</strong> works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.</p>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781849962759
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Radio Frequencies -- Medium Access Control -- Physical Layer -- Cryptography -- Wireless Security -- Configuring Wireless Networks -- Robust Security Network -- MAC Layer Performance Analysis -- Link Rate Adaptation -- Build a Xen Server -- Initial Configuration of Access-point Controllers.
Physical Description: XXI, 212 p. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84996-275-9
Publication Date: 2010.


Title: Pervasive Computing Innovations in Intelligent Multimedia and Applications / edited by Aboul-Ella Hassanien, Jemal H. Abawajy, Ajith Abraham, Hani Hagras.
Computer Communications and Networks,
Computer communications and networks,

Author: Hassanien, Aboul Ella.
Abawajy, Jemal H.
Abraham, Ajith.
Hagras, Hani.
SpringerLink (Online service)

General Notes: <P>Wireless Adaptive Therapeutic TeleGaming -- Intelligent Behavior Modeling and Control for Mobile Manipulators -- Resource-aware Fuzzy Logic Control of Video Streaming -- Indexing Video Summaries For Quick Video Browsing -- Sensorized Garment Augmented 3D Pervasive Virtual Reality System -- Innovative Solutions for Future Hotel Rooms -- Mobile Virtual Environments -- AI Techniques in a Context-aware Ubiquitous Environment -- A Distributed Ambient Intelligence-based Multi-agent System for Alzheimer Health Care -- Volcano Monitoring -- SiC: Architecture for Preventing and Detecting Attacks to Ubiquitous Databases -- HoCaMA: Home Care Hybrid Multi-agent Architecture -- Semantic Annotation for Web Service Processes -- Situation-aware Adaptive Processing (SAAP) of Data Streams -- A Scalable P2P Video Streaming Framework -- QoE in Pervasive Telecommunication Systems -- Agents-based e-Commerce and Securing Exchanged Information -- Neighbor Selection in P2P Overlay Networks -- Analysis of Pervasive Mobile Ad Hoc Routing Protocols.</P>.
<P>Pervasive computing (also referred to as ubiquitous computing or ambient intelligence) aims to create environments where computers are invisibly and seamlessly integrated and connected into our everyday environment. Pervasive computing and intelligent multimedia technologies are becoming increasingly important, although many potential applications have not yet been fully realized. These key technologies are creating a multimedia revolution that will have significant impact across a wide spectrum of consumer, business, healthcare, and governmental domains.</P> <P></P> <P>This useful volume provides up-to-date and state-of-the-art coverage of the diverse topics related to pervasive computing and intelligent multimedia technologies. The use of different computational intelligence-based approaches to various problems in pervasive computing are examined, including video streaming, intelligent behavior modeling and control for mobile manipulators, tele-gaming, indexing video summaries for quick video browsing, web service processes, virtual environments, ambient intelligence, and prevention and detection of attacks to ubiquitous databases.</P> <P></P> <P><STRONG>Topics and features:</STRONG></P> <P></P> <UL> <P> <LI>Includes a comprehensive overview, providing a thorough literature review and an outline of the important research challenges</LI> <P></P> <P> <LI>Discusses pervasive computing approaches in the context of intelligent multimedia</LI> <P></P> <P> <LI>Examines virtual reality technology, mobile virtual environments, and the potential use of intelligent multimedia and ubiquitous computing in the hotels of the future </LI> <P></P> <P> <LI>Describes various approaches in ambient intelligence for home health care for the elderly and those suffering from Alzheimer’s disease, for volcano monitoring, and for preventing attacks to ubiquitous databases</LI> <P></P></UL> <UL> <P> <LI>Investigates issues in web services and situation awareness in pervasive computing environments</LI> <P></P> <P> <LI>Explores wireless network applications, such as mobile agents and e-commerce</LI> <P></P></UL> <P></P> <P>This textbook/reference is an invaluable resource for researchers, postgraduate and senior undergraduate students, and practitioners involved in pervasive computing, intelligent multimedia, and computational intelligence.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848825994
Subject: Computer science.
Computer Communication Networks.
Computer system performance.
Multimedia systems.
Computer science.
Computer Communication Networks.
System Performance and Evaluation.
Multimedia Information Systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Wireless Adaptive Therapeutic TeleGaming -- Intelligent Behavior Modeling and Control for Mobile Manipulators -- Resource-aware Fuzzy Logic Control of Video Streaming -- Indexing Video Summaries For Quick Video Browsing -- Sensorized Garment Augmented 3D Pervasive Virtual Reality System -- Innovative Solutions for Future Hotel Rooms -- Mobile Virtual Environments -- AI Techniques in a Context-aware Ubiquitous Environment -- A Distributed Ambient Intelligence-based Multi-agent System for Alzheimer Health Care -- Volcano Monitoring -- SiC: Architecture for Preventing and Detecting Attacks to Ubiquitous Databases -- HoCaMA: Home Care Hybrid Multi-agent Architecture -- Semantic Annotation for Web Service Processes -- Situation-aware Adaptive Processing (SAAP) of Data Streams -- A Scalable P2P Video Streaming Framework -- QoE in Pervasive Telecommunication Systems -- Agents-based e-Commerce and Securing Exchanged Information -- Neighbor Selection in P2P Overlay Networks -- Analysis of Pervasive Mobile Ad Hoc Routing Protocols.</P>.
Physical Description: digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-599-4
Publication Date: 2010.


Title: Pervasive Computing Innovations in Intelligent Multimedia and Applications / edited by Aboul-Ella Hassanien, Jemal H. Abawajy, Ajith Abraham, Hani Hagras.
Computer Communications and Networks,
Computer communications and networks,

Author: Hassanien, Aboul Ella.
Abawajy, Jemal H.
Abraham, Ajith.
Hagras, Hani.
SpringerLink (Online service)

General Notes: <P>Wireless Adaptive Therapeutic TeleGaming -- Intelligent Behavior Modeling and Control for Mobile Manipulators -- Resource-aware Fuzzy Logic Control of Video Streaming -- Indexing Video Summaries For Quick Video Browsing -- Sensorized Garment Augmented 3D Pervasive Virtual Reality System -- Innovative Solutions for Future Hotel Rooms -- Mobile Virtual Environments -- AI Techniques in a Context-aware Ubiquitous Environment -- A Distributed Ambient Intelligence-based Multi-agent System for Alzheimer Health Care -- Volcano Monitoring -- SiC: Architecture for Preventing and Detecting Attacks to Ubiquitous Databases -- HoCaMA: Home Care Hybrid Multi-agent Architecture -- Semantic Annotation for Web Service Processes -- Situation-aware Adaptive Processing (SAAP) of Data Streams -- A Scalable P2P Video Streaming Framework -- QoE in Pervasive Telecommunication Systems -- Agents-based e-Commerce and Securing Exchanged Information -- Neighbor Selection in P2P Overlay Networks -- Analysis of Pervasive Mobile Ad Hoc Routing Protocols.</P>.
<P>Pervasive computing (also referred to as ubiquitous computing or ambient intelligence) aims to create environments where computers are invisibly and seamlessly integrated and connected into our everyday environment. Pervasive computing and intelligent multimedia technologies are becoming increasingly important, although many potential applications have not yet been fully realized. These key technologies are creating a multimedia revolution that will have significant impact across a wide spectrum of consumer, business, healthcare, and governmental domains.</P> <P></P> <P>This useful volume provides up-to-date and state-of-the-art coverage of the diverse topics related to pervasive computing and intelligent multimedia technologies. The use of different computational intelligence-based approaches to various problems in pervasive computing are examined, including video streaming, intelligent behavior modeling and control for mobile manipulators, tele-gaming, indexing video summaries for quick video browsing, web service processes, virtual environments, ambient intelligence, and prevention and detection of attacks to ubiquitous databases.</P> <P></P> <P><STRONG>Topics and features:</STRONG></P> <P></P> <UL> <P> <LI>Includes a comprehensive overview, providing a thorough literature review and an outline of the important research challenges</LI> <P></P> <P> <LI>Discusses pervasive computing approaches in the context of intelligent multimedia</LI> <P></P> <P> <LI>Examines virtual reality technology, mobile virtual environments, and the potential use of intelligent multimedia and ubiquitous computing in the hotels of the future </LI> <P></P> <P> <LI>Describes various approaches in ambient intelligence for home health care for the elderly and those suffering from Alzheimer’s disease, for volcano monitoring, and for preventing attacks to ubiquitous databases</LI> <P></P></UL> <UL> <P> <LI>Investigates issues in web services and situation awareness in pervasive computing environments</LI> <P></P> <P> <LI>Explores wireless network applications, such as mobile agents and e-commerce</LI> <P></P></UL> <P></P> <P>This textbook/reference is an invaluable resource for researchers, postgraduate and senior undergraduate students, and practitioners involved in pervasive computing, intelligent multimedia, and computational intelligence.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848825994
Subject: Computer science.
Computer Communication Networks.
Computer system performance.
Multimedia systems.
Computer science.
Computer Communication Networks.
System Performance and Evaluation.
Multimedia Information Systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Wireless Adaptive Therapeutic TeleGaming -- Intelligent Behavior Modeling and Control for Mobile Manipulators -- Resource-aware Fuzzy Logic Control of Video Streaming -- Indexing Video Summaries For Quick Video Browsing -- Sensorized Garment Augmented 3D Pervasive Virtual Reality System -- Innovative Solutions for Future Hotel Rooms -- Mobile Virtual Environments -- AI Techniques in a Context-aware Ubiquitous Environment -- A Distributed Ambient Intelligence-based Multi-agent System for Alzheimer Health Care -- Volcano Monitoring -- SiC: Architecture for Preventing and Detecting Attacks to Ubiquitous Databases -- HoCaMA: Home Care Hybrid Multi-agent Architecture -- Semantic Annotation for Web Service Processes -- Situation-aware Adaptive Processing (SAAP) of Data Streams -- A Scalable P2P Video Streaming Framework -- QoE in Pervasive Telecommunication Systems -- Agents-based e-Commerce and Securing Exchanged Information -- Neighbor Selection in P2P Overlay Networks -- Analysis of Pervasive Mobile Ad Hoc Routing Protocols.</P>.
Physical Description: digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-599-4
Publication Date: 2010.


Title: Guide to Wireless Sensor Networks edited by Subhas Chandra Misra, Isaac Woungang, Sudip Misra.
Computer Communications and Networks,
Computer communications and networks,

Author: Misra, Subhas Chandra.
Woungang, Isaac.
Misra, Sudip.
SpringerLink (Online service)

General Notes: <P>Energy Efficient Information Processing -- Topology Management -- Coverage -- Routing -- Geometric Routing -- Cooperative Relaying -- Data-Centricity -- Congestion and Flow Control -- Data Transport Control -- Fault Tolerant Algorithms/Protocols -- Self-organizing and Self-healing Schemes -- Quality of Service -- Embedded Operating Systems -- Adaptive Distributed Resource Allocation -- Scheduling Activities -- Energy-Efficient Medium Access Control -- Energy Efficient Resource Management Techniques -- Transmission Power Control Aware MAC -- Security -- Key Management -- Secure Data Aggregation -- Wireless Multimedia Sensor Networks -- Middleware -- Wireless Mobile Sensor Networks -- Analysis Methods -- Bio-inspired Communications -- Mobile Ad Hoc and Sensor Systems for Global and Homeland Security Applications.</P>.
<P>Wireless communication technologies continue to undergo rapid advancement. In recent years, there has been a steep growth in research in the area of wireless sensor networks (WSNs).</P> <P></P> <P>In WSNs, communication takes place with the help of spatially distributed, autonomous sensor nodes equipped to sense specific information. WSNs can be found in a variety of both military and civilian applications worldwide. Examples include detecting enemy intrusion on the battlefield, object tracking, habitat monitoring, patient monitoring and fire detection. Sensor networks are emerging as an attractive technology with great promise for the future. However, challenges remain to be addressed in issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy efficiency and security.</P> <P></P> <P>This highly useful Guide to Wireless Sensor Networks presents a comprehensive account of the fundamental concepts, new ideas and results in the field of WSNs. Offering a wide coverage of subjects, from core issues to specialized topics, this reader-friendly book provides a valuable reference for academics and practitioners alike. With its helpful teaching tools, it is also an ideal textbook for graduate students wishing to learn more about the topic.</P> <P></P> <P><STRONG>Features:</STRONG></P> <P>• Provides an accessible, comprehensive overview of the state-of-the-art technology of wireless sensor networks</P> <P>• Offers a set of questions at the end of each chapter to help readers assess their understanding of the various concepts</P> <P>• Includes reader-friendly discussions for practitioners, directions for future research, helpful lists of terms and definitions </P> <P>• Designed, in structure and content, to aid the learning process with the intention of making the book useful at all learning levels</P> <P>• Presents insight into the practical significance of these topics in real-world scenarios</P> <P>• Supplies supportive presentation PowerPoint slides and solutions to aid lecturers at www.springer.com/978-1-84882-217-7</P> <P></P> <P>Prof. Sudip Misra is a renowned expert in the field of computer networks and is currently working for the School of Information Technology at the Indian Institute of Technology Kharagpur. With contributions by some of the most prominent researchers in the field today, this book will be an invaluable source of reference for researchers and practitioners in the field of computer networking. Its pedagogical aids further extend its utility in academia.</P> <P></P> <P>Key Topics:</P> <P>• Energy Efficiency</P> <P>• Routing</P> <P>• Transport Control</P> <P>• Fault-tolerance</P> <P>• Quality of Service</P> <P>• Scheduling</P> <P>• Security</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848822184
Subject: Computer science.
Computer network architectures.
Computer Communication Networks.
Telecommunication.
Computer science.
Computer Communication Networks.
Communications Engineering, Networks.
Computer Systems Organization and Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Energy Efficient Information Processing -- Topology Management -- Coverage -- Routing -- Geometric Routing -- Cooperative Relaying -- Data-Centricity -- Congestion and Flow Control -- Data Transport Control -- Fault Tolerant Algorithms/Protocols -- Self-organizing and Self-healing Schemes -- Quality of Service -- Embedded Operating Systems -- Adaptive Distributed Resource Allocation -- Scheduling Activities -- Energy-Efficient Medium Access Control -- Energy Efficient Resource Management Techniques -- Transmission Power Control Aware MAC -- Security -- Key Management -- Secure Data Aggregation -- Wireless Multimedia Sensor Networks -- Middleware -- Wireless Mobile Sensor Networks -- Analysis Methods -- Bio-inspired Communications -- Mobile Ad Hoc and Sensor Systems for Global and Homeland Security Applications.</P>.
Physical Description: digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-218-4
Publication Date: 2009.


Title: Guide to Wireless Sensor Networks edited by Subhas Chandra Misra, Isaac Woungang, Sudip Misra.
Computer Communications and Networks,
Computer communications and networks,

Author: Misra, Subhas Chandra.
Woungang, Isaac.
Misra, Sudip.
SpringerLink (Online service)

General Notes: <P>Energy Efficient Information Processing -- Topology Management -- Coverage -- Routing -- Geometric Routing -- Cooperative Relaying -- Data-Centricity -- Congestion and Flow Control -- Data Transport Control -- Fault Tolerant Algorithms/Protocols -- Self-organizing and Self-healing Schemes -- Quality of Service -- Embedded Operating Systems -- Adaptive Distributed Resource Allocation -- Scheduling Activities -- Energy-Efficient Medium Access Control -- Energy Efficient Resource Management Techniques -- Transmission Power Control Aware MAC -- Security -- Key Management -- Secure Data Aggregation -- Wireless Multimedia Sensor Networks -- Middleware -- Wireless Mobile Sensor Networks -- Analysis Methods -- Bio-inspired Communications -- Mobile Ad Hoc and Sensor Systems for Global and Homeland Security Applications.</P>.
<P>Wireless communication technologies continue to undergo rapid advancement. In recent years, there has been a steep growth in research in the area of wireless sensor networks (WSNs).</P> <P></P> <P>In WSNs, communication takes place with the help of spatially distributed, autonomous sensor nodes equipped to sense specific information. WSNs can be found in a variety of both military and civilian applications worldwide. Examples include detecting enemy intrusion on the battlefield, object tracking, habitat monitoring, patient monitoring and fire detection. Sensor networks are emerging as an attractive technology with great promise for the future. However, challenges remain to be addressed in issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy efficiency and security.</P> <P></P> <P>This highly useful Guide to Wireless Sensor Networks presents a comprehensive account of the fundamental concepts, new ideas and results in the field of WSNs. Offering a wide coverage of subjects, from core issues to specialized topics, this reader-friendly book provides a valuable reference for academics and practitioners alike. With its helpful teaching tools, it is also an ideal textbook for graduate students wishing to learn more about the topic.</P> <P></P> <P><STRONG>Features:</STRONG></P> <P>• Provides an accessible, comprehensive overview of the state-of-the-art technology of wireless sensor networks</P> <P>• Offers a set of questions at the end of each chapter to help readers assess their understanding of the various concepts</P> <P>• Includes reader-friendly discussions for practitioners, directions for future research, helpful lists of terms and definitions </P> <P>• Designed, in structure and content, to aid the learning process with the intention of making the book useful at all learning levels</P> <P>• Presents insight into the practical significance of these topics in real-world scenarios</P> <P>• Supplies supportive presentation PowerPoint slides and solutions to aid lecturers at www.springer.com/978-1-84882-217-7</P> <P></P> <P>Prof. Sudip Misra is a renowned expert in the field of computer networks and is currently working for the School of Information Technology at the Indian Institute of Technology Kharagpur. With contributions by some of the most prominent researchers in the field today, this book will be an invaluable source of reference for researchers and practitioners in the field of computer networking. Its pedagogical aids further extend its utility in academia.</P> <P></P> <P>Key Topics:</P> <P>• Energy Efficiency</P> <P>• Routing</P> <P>• Transport Control</P> <P>• Fault-tolerance</P> <P>• Quality of Service</P> <P>• Scheduling</P> <P>• Security</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848822184
Subject: Computer science.
Computer network architectures.
Computer Communication Networks.
Telecommunication.
Computer science.
Computer Communication Networks.
Communications Engineering, Networks.
Computer Systems Organization and Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Energy Efficient Information Processing -- Topology Management -- Coverage -- Routing -- Geometric Routing -- Cooperative Relaying -- Data-Centricity -- Congestion and Flow Control -- Data Transport Control -- Fault Tolerant Algorithms/Protocols -- Self-organizing and Self-healing Schemes -- Quality of Service -- Embedded Operating Systems -- Adaptive Distributed Resource Allocation -- Scheduling Activities -- Energy-Efficient Medium Access Control -- Energy Efficient Resource Management Techniques -- Transmission Power Control Aware MAC -- Security -- Key Management -- Secure Data Aggregation -- Wireless Multimedia Sensor Networks -- Middleware -- Wireless Mobile Sensor Networks -- Analysis Methods -- Bio-inspired Communications -- Mobile Ad Hoc and Sensor Systems for Global and Homeland Security Applications.</P>.
Physical Description: digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-218-4
Publication Date: 2009.


Title: Computational Social Network Analysis Trends, Tools and Research Advances / edited by Ajith Abraham, Aboul-Ella Hassanien, Vaclav Sná¿el.
Computer Communications and Networks,
Computer communications and networks,

Author: Abraham, Ajith.
Hassanien, Aboul Ella.
Sná¿el, Vaclav.
SpringerLink (Online service)

General Notes: <P>An Overview of Methods for Virtual Social Networks Analysis -- Discovering Sets of Key Players in Social Networks -- Towards Self-organizing Search Systems -- DISSECT: Data-Intensive Socially Similar Evolving Community Tracker -- Clustering of Blog Sites using Collective Wisdom -- Exploratory Analysis of the Social Network of Researchers in Inductive Logic Programming -- Information Flow in Systems of Interacting Agents as a Function of Local and Global Topological Features -- Network Evolution -- Vmap-Layout, a Layout Algorithm for Drawing Scientograms -- Nature-inspired Dissemination of Information in P2P Networks -- Analysis and Visualization of Relations in eLearning -- Interdisciplinary Matchmaking -- Web Communities Defined by Web Page Content -- Extended Generalized Block Modeling for Compound Communities and External Actors -- Analyzing Collaborations Through Content-Based Social Networks -- IA-Regional-Radio -- On the Use of Social Networks in Web Services -- Friends with Faces.</P>.
<P>Social networks provide a powerful abstraction of the structure and dynamics of diverse kinds of people or people-to-technology interaction. Web 2.0 has enabled a new generation of web-based communities, social networks, and folksonomies to facilitate collaboration among different communities.</P> <P>This unique text/reference compares and contrasts the ethological approach to social behavior in animals with web-based evidence of social interaction, perceptual learning, information granulation, the behavior of humans and affinities between web-based social networks. An international team of leading experts present the latest advances of various topics in intelligent-social-networks and illustrates how organizations can gain competitive advantages by applying the different emergent techniques in real-world scenarios. The work incorporates experience reports, survey articles, and intelligence techniques and theories with specific network technology problems.</P> <P><STRONG>Topics and Features:</STRONG></P> <UL> <P> <LI>Provides an overview social network tools, and explores methods for discovering key players in social networks, designing self-organizing search systems, and clustering blog sites</LI> <P></P> <P> <LI>Surveys techniques for exploratory analysis and text mining of social networks, approaches to tracking online community interaction, and examines how the topological features of a system affects the flow of information</LI> <P></P> <P> <LI>Reviews the models of network evolution, covering scientific co-citation networks, nature-inspired frameworks, latent social networks in e-Learning systems, and compound communities</LI> <P></P> <P> <LI>Examines the relationship between the intent of web pages, their architecture and the communities who take part in their usage and creation</LI> <P></P></UL> <UL> <P> <LI>Discusses team selection based on members’ social context</LI> <P></P> <P> <LI>Presents social network applications, including music recommendation and face recognition in photographs</LI> <P></P></UL> <UL> <P> <LI>Explores the use of social networks in web services that focus on the discovery stage in the life cycle of these web services</LI> <P></P></UL> <P>This useful and comprehensive volume will be indispensible to senior undergraduate and postgraduate students taking courses in Social Intelligence, as well as to researchers, developers, and postgraduates interested in intelligent-social-networks research and related areas.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848822290
Subject: Computer science.
Computer Communication Networks.
Database management.
Computer science.
Computer Communication Networks.
Database management.
User Interfaces and Human Computer Interaction.
Computers and Society.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>An Overview of Methods for Virtual Social Networks Analysis -- Discovering Sets of Key Players in Social Networks -- Towards Self-organizing Search Systems -- DISSECT: Data-Intensive Socially Similar Evolving Community Tracker -- Clustering of Blog Sites using Collective Wisdom -- Exploratory Analysis of the Social Network of Researchers in Inductive Logic Programming -- Information Flow in Systems of Interacting Agents as a Function of Local and Global Topological Features -- Network Evolution -- Vmap-Layout, a Layout Algorithm for Drawing Scientograms -- Nature-inspired Dissemination of Information in P2P Networks -- Analysis and Visualization of Relations in eLearning -- Interdisciplinary Matchmaking -- Web Communities Defined by Web Page Content -- Extended Generalized Block Modeling for Compound Communities and External Actors -- Analyzing Collaborations Through Content-Based Social Networks -- IA-Regional-Radio -- On the Use of Social Networks in Web Services -- Friends with Faces.</P>.
Physical Description: XII, 485p. 203 illus. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-229-0
Publication Date: 2010.


Title: Computational Social Network Analysis Trends, Tools and Research Advances / edited by Ajith Abraham, Aboul-Ella Hassanien, Vaclav Sná¿el.
Computer Communications and Networks,
Computer communications and networks,

Author: Abraham, Ajith.
Hassanien, Aboul Ella.
Sná¿el, Vaclav.
SpringerLink (Online service)

General Notes: <P>An Overview of Methods for Virtual Social Networks Analysis -- Discovering Sets of Key Players in Social Networks -- Towards Self-organizing Search Systems -- DISSECT: Data-Intensive Socially Similar Evolving Community Tracker -- Clustering of Blog Sites using Collective Wisdom -- Exploratory Analysis of the Social Network of Researchers in Inductive Logic Programming -- Information Flow in Systems of Interacting Agents as a Function of Local and Global Topological Features -- Network Evolution -- Vmap-Layout, a Layout Algorithm for Drawing Scientograms -- Nature-inspired Dissemination of Information in P2P Networks -- Analysis and Visualization of Relations in eLearning -- Interdisciplinary Matchmaking -- Web Communities Defined by Web Page Content -- Extended Generalized Block Modeling for Compound Communities and External Actors -- Analyzing Collaborations Through Content-Based Social Networks -- IA-Regional-Radio -- On the Use of Social Networks in Web Services -- Friends with Faces.</P>.
<P>Social networks provide a powerful abstraction of the structure and dynamics of diverse kinds of people or people-to-technology interaction. Web 2.0 has enabled a new generation of web-based communities, social networks, and folksonomies to facilitate collaboration among different communities.</P> <P>This unique text/reference compares and contrasts the ethological approach to social behavior in animals with web-based evidence of social interaction, perceptual learning, information granulation, the behavior of humans and affinities between web-based social networks. An international team of leading experts present the latest advances of various topics in intelligent-social-networks and illustrates how organizations can gain competitive advantages by applying the different emergent techniques in real-world scenarios. The work incorporates experience reports, survey articles, and intelligence techniques and theories with specific network technology problems.</P> <P><STRONG>Topics and Features:</STRONG></P> <UL> <P> <LI>Provides an overview social network tools, and explores methods for discovering key players in social networks, designing self-organizing search systems, and clustering blog sites</LI> <P></P> <P> <LI>Surveys techniques for exploratory analysis and text mining of social networks, approaches to tracking online community interaction, and examines how the topological features of a system affects the flow of information</LI> <P></P> <P> <LI>Reviews the models of network evolution, covering scientific co-citation networks, nature-inspired frameworks, latent social networks in e-Learning systems, and compound communities</LI> <P></P> <P> <LI>Examines the relationship between the intent of web pages, their architecture and the communities who take part in their usage and creation</LI> <P></P></UL> <UL> <P> <LI>Discusses team selection based on members’ social context</LI> <P></P> <P> <LI>Presents social network applications, including music recommendation and face recognition in photographs</LI> <P></P></UL> <UL> <P> <LI>Explores the use of social networks in web services that focus on the discovery stage in the life cycle of these web services</LI> <P></P></UL> <P>This useful and comprehensive volume will be indispensible to senior undergraduate and postgraduate students taking courses in Social Intelligence, as well as to researchers, developers, and postgraduates interested in intelligent-social-networks research and related areas.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781848822290
Subject: Computer science.
Computer Communication Networks.
Database management.
Computer science.
Computer Communication Networks.
Database management.
User Interfaces and Human Computer Interaction.
Computers and Society.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>An Overview of Methods for Virtual Social Networks Analysis -- Discovering Sets of Key Players in Social Networks -- Towards Self-organizing Search Systems -- DISSECT: Data-Intensive Socially Similar Evolving Community Tracker -- Clustering of Blog Sites using Collective Wisdom -- Exploratory Analysis of the Social Network of Researchers in Inductive Logic Programming -- Information Flow in Systems of Interacting Agents as a Function of Local and Global Topological Features -- Network Evolution -- Vmap-Layout, a Layout Algorithm for Drawing Scientograms -- Nature-inspired Dissemination of Information in P2P Networks -- Analysis and Visualization of Relations in eLearning -- Interdisciplinary Matchmaking -- Web Communities Defined by Web Page Content -- Extended Generalized Block Modeling for Compound Communities and External Actors -- Analyzing Collaborations Through Content-Based Social Networks -- IA-Regional-Radio -- On the Use of Social Networks in Web Services -- Friends with Faces.</P>.
Physical Description: XII, 485p. 203 illus. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84882-229-0
Publication Date: 2010.


Title: Coverage Control in Sensor Networks by Bang Wang.
Computer Communications and Networks,
Computer communications and networks,

Author: Wang, Bang.
SpringerLink (Online service)

General Notes: <P>Part I: Introduction -- Introduction -- Sensor Coverage Model -- Network Coverage Control -- Part II Target Coverage Problems -- Node Placement Optimization -- Coverage Lifetime Maximization -- Part III Area Coverage Problems -- Critical Sensor Density -- Sensor Activity Scheduling -- Node Movement Strategy -- Part IV Barrier Coverage Problems -- Build Intrusion Barriers -- Find Penetration Paths.</P>.
<P>Advances in sensor technology have yielded sensors with ever-increasing accuracy and higher spatial and temporal resolution—while their size, weight, and cost have decreased by many orders of magnitude. Sensor networks have been developing at a similarly rapid pace, with more and more real-world deployments for various applications. </P> <P>This easy-to-read text focuses on challenges in coverage control—how to efficiently control individual sensors’ sensing unit to achieve network-wide coverage quality. As one of the most fundamental and important research issues in sensor networks, coverage control problems have been intensively studied in recent years.</P> <P>Divided into four parts, this book opens with a general introduction, before presenting three categories of coverage control problems—point coverage, area coverage and barrier coverage—in the following parts. Employing a tutorial-like style, this book examines the fundamental coverage problems in each category and presents the most recent advances and techniques in the field.</P> <P><STRONG>Topics and features:</STRONG></P> <P>• Provides an introduction to sensors, sensor nodes, sensor networks, and sensor coverage models</P> <P>• Supplies an informal definition and taxonomy for network-wide coverage control</P> <P>• Explores the node placement optimization problem for coverage configuration before network deployment</P> <P>• Investigates the coverage lifetime maximization problem by controlling coverage characteristics in a randomly deployed network</P> <P>• Discusses the critical sensor-density problem for coverage configuration before network deployment</P> <P>• Examines the sensor-activity scheduling problem of controlling network coverage characteristics in a randomly deployed network</P> <P>• Introduces the node movement strategy problem for sensor networks containing mobile nodes</P> <P>• Presents the challenges of building intrusion barriers and finding penetration paths</P> <P>This useful text/reference for graduate students provides an overview of various coverage-control problems in sensor networks. The problem scenarios, solution techniques, and protocols presented in the text will also be of interest to researchers, developers and professionals. </P> <P><STRONG>Dr. Bang Wang</STRONG> is a researcher in the Intelligent Systems Center in Singapore, an applied research center jointly set up by Singapore Technologies Engineering and Nanyang Technological University.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781849960595
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Part I: Introduction -- Introduction -- Sensor Coverage Model -- Network Coverage Control -- Part II Target Coverage Problems -- Node Placement Optimization -- Coverage Lifetime Maximization -- Part III Area Coverage Problems -- Critical Sensor Density -- Sensor Activity Scheduling -- Node Movement Strategy -- Part IV Barrier Coverage Problems -- Build Intrusion Barriers -- Find Penetration Paths.</P>.
Physical Description: XV, 210p. 158 illus., 79 illus. in color. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84996-059-5
Publication Date: 2010.


Title: Coverage Control in Sensor Networks by Bang Wang.
Computer Communications and Networks,
Computer communications and networks,

Author: Wang, Bang.
SpringerLink (Online service)

General Notes: <P>Part I: Introduction -- Introduction -- Sensor Coverage Model -- Network Coverage Control -- Part II Target Coverage Problems -- Node Placement Optimization -- Coverage Lifetime Maximization -- Part III Area Coverage Problems -- Critical Sensor Density -- Sensor Activity Scheduling -- Node Movement Strategy -- Part IV Barrier Coverage Problems -- Build Intrusion Barriers -- Find Penetration Paths.</P>.
<P>Advances in sensor technology have yielded sensors with ever-increasing accuracy and higher spatial and temporal resolution—while their size, weight, and cost have decreased by many orders of magnitude. Sensor networks have been developing at a similarly rapid pace, with more and more real-world deployments for various applications. </P> <P>This easy-to-read text focuses on challenges in coverage control—how to efficiently control individual sensors’ sensing unit to achieve network-wide coverage quality. As one of the most fundamental and important research issues in sensor networks, coverage control problems have been intensively studied in recent years.</P> <P>Divided into four parts, this book opens with a general introduction, before presenting three categories of coverage control problems—point coverage, area coverage and barrier coverage—in the following parts. Employing a tutorial-like style, this book examines the fundamental coverage problems in each category and presents the most recent advances and techniques in the field.</P> <P><STRONG>Topics and features:</STRONG></P> <P>• Provides an introduction to sensors, sensor nodes, sensor networks, and sensor coverage models</P> <P>• Supplies an informal definition and taxonomy for network-wide coverage control</P> <P>• Explores the node placement optimization problem for coverage configuration before network deployment</P> <P>• Investigates the coverage lifetime maximization problem by controlling coverage characteristics in a randomly deployed network</P> <P>• Discusses the critical sensor-density problem for coverage configuration before network deployment</P> <P>• Examines the sensor-activity scheduling problem of controlling network coverage characteristics in a randomly deployed network</P> <P>• Introduces the node movement strategy problem for sensor networks containing mobile nodes</P> <P>• Presents the challenges of building intrusion barriers and finding penetration paths</P> <P>This useful text/reference for graduate students provides an overview of various coverage-control problems in sensor networks. The problem scenarios, solution techniques, and protocols presented in the text will also be of interest to researchers, developers and professionals. </P> <P><STRONG>Dr. Bang Wang</STRONG> is a researcher in the Intelligent Systems Center in Singapore, an applied research center jointly set up by Singapore Technologies Engineering and Nanyang Technological University.</P>

Publisher: Springer London,
Publication Place: London :
ISBN: 9781849960595
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: <P>Part I: Introduction -- Introduction -- Sensor Coverage Model -- Network Coverage Control -- Part II Target Coverage Problems -- Node Placement Optimization -- Coverage Lifetime Maximization -- Part III Area Coverage Problems -- Critical Sensor Density -- Sensor Activity Scheduling -- Node Movement Strategy -- Part IV Barrier Coverage Problems -- Build Intrusion Barriers -- Find Penetration Paths.</P>.
Physical Description: XV, 210p. 158 illus., 79 illus. in color. digital.
Electronic Location: http://dx.doi.org/10.1007/978-1-84996-059-5
Publication Date: 2010.


Title: Next-Generation Wireless Technologies 4G and Beyond / edited by Naveen Chilamkurti, Sherali Zeadally, Hakima Chaouchi.
Computer Communications and Networks,
Computer communications and networks,

Author: Chilamkurti, Naveen. editor.
Zeadally, Sherali. editor.
Chaouchi, Hakima. editor.
SpringerLink (Online service)

General Notes: Part I: Trends and Challenges of Emerging Wireless Networks -- Trends and Challenges of Emerging Wireless Networks -- Cooperative Mesh Networks -- Cooperation in Delay Tolerant Networks -- Wireless Multimedia -- Part II: Wireless Communications and Applications -- Vehicular Ad-Hoc Networks -- Broadband Wireless Technologies -- RFID -- Energy-Efficient Routing in Wireless Sensor Networks -- Part III: Future Internet Systems -- Internet of Things -- Communication Issues in the Internet of Things -- Machine to Machine Communications -- Security in Emerging 4G Networks -- Electronic Health Records.
Fourth-generation (4G) or long-term evolution (LTE) technology offers the promise of even smarter computing and multimedia applications which will be available anywhere, at any time. This comprehensive text/reference presents a detailed review of the pioneering research underpinning this emerging technological revolution. The book also examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Opening with a selection of chapters devoted to the exciting trends in wireless network technology, followed by a section focusing on advanced applications, the text then concludes with an investigation into the future internet systems that will pave the way towards true ubiquitous computing. Topics and features: Presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies Discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE Examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications Introduces developments towards the ‘Internet of Things’ from both a communications and a service perspective Discusses the machine-to-machine communication model, important applications of wireless technologies in healthcare, and security issues in state-of-the-art networks This wide-ranging, cutting-edge volume is a ‘must-read’ for all researchers and practitioners involved in wireless communications. Dr. Naveen Chilamkurti is a Senior Lecturer in the Department of Computer Science and Engineering at La Trobe University, Melbourne, Australia. Dr. Sherali Zeadally is an Associate Professor in the Department of Computer Science and Information Technology at the University of the District of Columbia, USA. Dr. Hakima Chaouchi is an Associate Professor at Telecom SudParis, France.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447151647
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Trends and Challenges of Emerging Wireless Networks -- Trends and Challenges of Emerging Wireless Networks -- Cooperative Mesh Networks -- Cooperation in Delay Tolerant Networks -- Wireless Multimedia -- Part II: Wireless Communications and Applications -- Vehicular Ad-Hoc Networks -- Broadband Wireless Technologies -- RFID -- Energy-Efficient Routing in Wireless Sensor Networks -- Part III: Future Internet Systems -- Internet of Things -- Communication Issues in the Internet of Things -- Machine to Machine Communications -- Security in Emerging 4G Networks -- Electronic Health Records.
Physical Description: X, 285 p. 92 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-5164-7
Publication Date: 2013.


Title: Next-Generation Wireless Technologies 4G and Beyond / edited by Naveen Chilamkurti, Sherali Zeadally, Hakima Chaouchi.
Computer Communications and Networks,
Computer communications and networks,

Author: Chilamkurti, Naveen. editor.
Zeadally, Sherali. editor.
Chaouchi, Hakima. editor.
SpringerLink (Online service)

General Notes: Part I: Trends and Challenges of Emerging Wireless Networks -- Trends and Challenges of Emerging Wireless Networks -- Cooperative Mesh Networks -- Cooperation in Delay Tolerant Networks -- Wireless Multimedia -- Part II: Wireless Communications and Applications -- Vehicular Ad-Hoc Networks -- Broadband Wireless Technologies -- RFID -- Energy-Efficient Routing in Wireless Sensor Networks -- Part III: Future Internet Systems -- Internet of Things -- Communication Issues in the Internet of Things -- Machine to Machine Communications -- Security in Emerging 4G Networks -- Electronic Health Records.
Fourth-generation (4G) or long-term evolution (LTE) technology offers the promise of even smarter computing and multimedia applications which will be available anywhere, at any time. This comprehensive text/reference presents a detailed review of the pioneering research underpinning this emerging technological revolution. The book also examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Opening with a selection of chapters devoted to the exciting trends in wireless network technology, followed by a section focusing on advanced applications, the text then concludes with an investigation into the future internet systems that will pave the way towards true ubiquitous computing. Topics and features: Presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies Discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE Examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications Introduces developments towards the ‘Internet of Things’ from both a communications and a service perspective Discusses the machine-to-machine communication model, important applications of wireless technologies in healthcare, and security issues in state-of-the-art networks This wide-ranging, cutting-edge volume is a ‘must-read’ for all researchers and practitioners involved in wireless communications. Dr. Naveen Chilamkurti is a Senior Lecturer in the Department of Computer Science and Engineering at La Trobe University, Melbourne, Australia. Dr. Sherali Zeadally is an Associate Professor in the Department of Computer Science and Information Technology at the University of the District of Columbia, USA. Dr. Hakima Chaouchi is an Associate Professor at Telecom SudParis, France.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447151647
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Trends and Challenges of Emerging Wireless Networks -- Trends and Challenges of Emerging Wireless Networks -- Cooperative Mesh Networks -- Cooperation in Delay Tolerant Networks -- Wireless Multimedia -- Part II: Wireless Communications and Applications -- Vehicular Ad-Hoc Networks -- Broadband Wireless Technologies -- RFID -- Energy-Efficient Routing in Wireless Sensor Networks -- Part III: Future Internet Systems -- Internet of Things -- Communication Issues in the Internet of Things -- Machine to Machine Communications -- Security in Emerging 4G Networks -- Electronic Health Records.
Physical Description: X, 285 p. 92 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-5164-7
Publication Date: 2013.


Title: Distributed Graph Algorithms for Computer Networks by K. Erciyes.
Computer Communications and Networks,
Computer communications and networks,

Author: Erciyes, K. author.
SpringerLink (Online service)

General Notes: Introduction -- Part I: Fundamental Algorithms -- Graphs -- The Computational Model -- Spanning Tree Construction -- Graph Traversals -- Minimal Spanning Trees -- Routing -- Self-Stabilization -- Part II: Graph Theoretical Algorithms -- Vertex Coloring -- Maximal Independent Sets -- Dominating Sets -- Matching -- Vertex Cover -- Part III: Ad Hoc Wireless Networks -- Introduction -- Topology Control -- Ad Hoc Routing -- Sensor Network Applications -- ASSIST: A Simulator to Develop Distributed Algorithms -- Pseudocode Conventions -- ASSIST Code -- Applications Using ASSIST.
Graph theory is an invaluable tool for the designer of algorithms for distributed systems. This hands-on textbook/reference presents a comprehensive review of key distributed graph algorithms for computer network applications, with a particular emphasis on practical implementation. Each chapter opens with a concise introduction to a specific problem, supporting the theory with numerous examples, before providing a list of relevant algorithms. These algorithms are described in detail from conceptual basis to pseudocode, complete with graph templates for the stepwise implementation of the algorithm, followed by its analysis. The chapters then conclude with summarizing notes and programming exercises. Topics and features: Introduces a range of fundamental graph algorithms, covering spanning trees, graph traversal algorithms, routing algorithms, and self-stabilization Reviews graph-theoretical distributed approximation algorithms with applications in ad hoc wireless networks Describes in detail the implementation of each algorithm, with extensive use of supporting examples, and discusses their concrete network applications Examines key graph-theoretical algorithm concepts, such as dominating sets, and parameters for mobility and energy levels of nodes in wireless ad hoc networks, and provides a contemporary survey of each topic Presents a simple simulator, developed to run distributed algorithms Provides practical exercises at the end of each chapter This classroom-tested and easy-to-follow textbook is essential reading for all graduate students and researchers interested in discrete mathematics, algorithms and computer networks. Prof. Dr. Kayhan Erciyeş is the Rector and a member of the Computer Engineering Department at Izmir University, Turkey              

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447151739
Subject: Computer science.
Computer Communication Networks.
Computer software.
Computer science.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Math Applications in Computer Science.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Part I: Fundamental Algorithms -- Graphs -- The Computational Model -- Spanning Tree Construction -- Graph Traversals -- Minimal Spanning Trees -- Routing -- Self-Stabilization -- Part II: Graph Theoretical Algorithms -- Vertex Coloring -- Maximal Independent Sets -- Dominating Sets -- Matching -- Vertex Cover -- Part III: Ad Hoc Wireless Networks -- Introduction -- Topology Control -- Ad Hoc Routing -- Sensor Network Applications -- ASSIST: A Simulator to Develop Distributed Algorithms -- Pseudocode Conventions -- ASSIST Code -- Applications Using ASSIST.
Physical Description: XVIII, 324 p. 167 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-5173-9
Publication Date: 2013.


Title: Distributed Graph Algorithms for Computer Networks by K. Erciyes.
Computer Communications and Networks,
Computer communications and networks,

Author: Erciyes, K. author.
SpringerLink (Online service)

General Notes: Introduction -- Part I: Fundamental Algorithms -- Graphs -- The Computational Model -- Spanning Tree Construction -- Graph Traversals -- Minimal Spanning Trees -- Routing -- Self-Stabilization -- Part II: Graph Theoretical Algorithms -- Vertex Coloring -- Maximal Independent Sets -- Dominating Sets -- Matching -- Vertex Cover -- Part III: Ad Hoc Wireless Networks -- Introduction -- Topology Control -- Ad Hoc Routing -- Sensor Network Applications -- ASSIST: A Simulator to Develop Distributed Algorithms -- Pseudocode Conventions -- ASSIST Code -- Applications Using ASSIST.
Graph theory is an invaluable tool for the designer of algorithms for distributed systems. This hands-on textbook/reference presents a comprehensive review of key distributed graph algorithms for computer network applications, with a particular emphasis on practical implementation. Each chapter opens with a concise introduction to a specific problem, supporting the theory with numerous examples, before providing a list of relevant algorithms. These algorithms are described in detail from conceptual basis to pseudocode, complete with graph templates for the stepwise implementation of the algorithm, followed by its analysis. The chapters then conclude with summarizing notes and programming exercises. Topics and features: Introduces a range of fundamental graph algorithms, covering spanning trees, graph traversal algorithms, routing algorithms, and self-stabilization Reviews graph-theoretical distributed approximation algorithms with applications in ad hoc wireless networks Describes in detail the implementation of each algorithm, with extensive use of supporting examples, and discusses their concrete network applications Examines key graph-theoretical algorithm concepts, such as dominating sets, and parameters for mobility and energy levels of nodes in wireless ad hoc networks, and provides a contemporary survey of each topic Presents a simple simulator, developed to run distributed algorithms Provides practical exercises at the end of each chapter This classroom-tested and easy-to-follow textbook is essential reading for all graduate students and researchers interested in discrete mathematics, algorithms and computer networks. Prof. Dr. Kayhan Erciyeş is the Rector and a member of the Computer Engineering Department at Izmir University, Turkey              

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447151739
Subject: Computer science.
Computer Communication Networks.
Computer software.
Computer science.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Math Applications in Computer Science.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Part I: Fundamental Algorithms -- Graphs -- The Computational Model -- Spanning Tree Construction -- Graph Traversals -- Minimal Spanning Trees -- Routing -- Self-Stabilization -- Part II: Graph Theoretical Algorithms -- Vertex Coloring -- Maximal Independent Sets -- Dominating Sets -- Matching -- Vertex Cover -- Part III: Ad Hoc Wireless Networks -- Introduction -- Topology Control -- Ad Hoc Routing -- Sensor Network Applications -- ASSIST: A Simulator to Develop Distributed Algorithms -- Pseudocode Conventions -- ASSIST Code -- Applications Using ASSIST.
Physical Description: XVIII, 324 p. 167 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-5173-9
Publication Date: 2013.


Title: Advanced Network Programming – Principles and Techniques Network Application Programming with Java / by Bogdan Ciubotaru, Gabriel-Miro Muntean.
Computer Communications and Networks,
Computer communications and networks,

Author: Ciubotaru, Bogdan. author.
Muntean, Gabriel-Miro. author.
SpringerLink (Online service)

General Notes: Introduction -- Network Architectures -- Network Communications Protocols and Services -- Basic Network Programming -- Sockets -- Socket-Based Client Server Communication -- Support for Communication-Based Services -- Server-Side Network Programming -- Client-Side Network Programming -- Advanced Client-Server Network Programming -- Conclusion.
The field of network programming is so large, and developing so rapidly, that it can appear almost overwhelming to those new to the discipline. Answering the need for an accessible overview of the field, this text/reference presents a manageable introduction to both the theoretical and practical aspects of computer networks and network programming. Clearly structured and easy to follow, the book describes cutting-edge developments in network architectures, communication protocols, and programming techniques and models, supported by code examples for hands-on practice with creating network-based applications. Topics and features: Presents detailed coverage of network architectures, including the latest wireless heterogeneous networks, communication protocols, and support for communication-based services Gently introduces the reader to the basic ideas underpinning computer networking, before gradually building up to more advanced concepts Provides numerous step-by-step descriptions of practical examples in tandem with the theoretical discussions Examines a range of network programming techniques, from server-side and client-side solutions to advanced client-server communication models Reviews network-based data storage and multimedia transfer Includes an extensive set of practical code examples, together with detailed comments and explanations This comprehensive and authoritative guide is an invaluable asset for all researchers interested in computer networking, whether they wish to understand the underlying architectures and paradigms, or to obtain useful advice on building communication-based programs. Advanced undergraduate and postgraduate students will also find the book to be an excellent supplementary textbook for modules on network programming.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447152927
Subject: Computer science.
Computer Communication Networks.
Software engineering.
Computer science.
Computer Communication Networks.
Programming Techniques.
Special Purpose and Application-Based Systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Network Architectures -- Network Communications Protocols and Services -- Basic Network Programming -- Sockets -- Socket-Based Client Server Communication -- Support for Communication-Based Services -- Server-Side Network Programming -- Client-Side Network Programming -- Advanced Client-Server Network Programming -- Conclusion.
Physical Description: XVI, 250 p. 72 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-5292-7
Publication Date: 2013.


Title: Advanced Network Programming – Principles and Techniques Network Application Programming with Java / by Bogdan Ciubotaru, Gabriel-Miro Muntean.
Computer Communications and Networks,
Computer communications and networks,

Author: Ciubotaru, Bogdan. author.
Muntean, Gabriel-Miro. author.
SpringerLink (Online service)

General Notes: Introduction -- Network Architectures -- Network Communications Protocols and Services -- Basic Network Programming -- Sockets -- Socket-Based Client Server Communication -- Support for Communication-Based Services -- Server-Side Network Programming -- Client-Side Network Programming -- Advanced Client-Server Network Programming -- Conclusion.
The field of network programming is so large, and developing so rapidly, that it can appear almost overwhelming to those new to the discipline. Answering the need for an accessible overview of the field, this text/reference presents a manageable introduction to both the theoretical and practical aspects of computer networks and network programming. Clearly structured and easy to follow, the book describes cutting-edge developments in network architectures, communication protocols, and programming techniques and models, supported by code examples for hands-on practice with creating network-based applications. Topics and features: Presents detailed coverage of network architectures, including the latest wireless heterogeneous networks, communication protocols, and support for communication-based services Gently introduces the reader to the basic ideas underpinning computer networking, before gradually building up to more advanced concepts Provides numerous step-by-step descriptions of practical examples in tandem with the theoretical discussions Examines a range of network programming techniques, from server-side and client-side solutions to advanced client-server communication models Reviews network-based data storage and multimedia transfer Includes an extensive set of practical code examples, together with detailed comments and explanations This comprehensive and authoritative guide is an invaluable asset for all researchers interested in computer networking, whether they wish to understand the underlying architectures and paradigms, or to obtain useful advice on building communication-based programs. Advanced undergraduate and postgraduate students will also find the book to be an excellent supplementary textbook for modules on network programming.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447152927
Subject: Computer science.
Computer Communication Networks.
Software engineering.
Computer science.
Computer Communication Networks.
Programming Techniques.
Special Purpose and Application-Based Systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Network Architectures -- Network Communications Protocols and Services -- Basic Network Programming -- Sockets -- Socket-Based Client Server Communication -- Support for Communication-Based Services -- Server-Side Network Programming -- Client-Side Network Programming -- Advanced Client-Server Network Programming -- Conclusion.
Physical Description: XVI, 250 p. 72 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-5292-7
Publication Date: 2013.


Title: Guide to Voice and Video over IP For Fixed and Mobile Networks / by Lingfen Sun, Is-Haka Mkwawa, Emmanuel Jammeh, Emmanuel Ifeachor.
Computer Communications and Networks,
Computer communications and networks,

Author: Sun, Lingfen. author.
Mkwawa, Is-Haka. author.
Jammeh, Emmanuel. author.
Ifeachor, Emmanuel. author.
SpringerLink (Online service)

General Notes: Introduction -- Speech Compression -- Video Compression -- Media Transport for VoIP -- VoIP Signalling – SIP -- VoIP Quality of Experience (QoE) -- IMS and Mobile VoIP -- Case Study 1: Building Up a VoIP System Based on Asterisk -- Case Study 2: VoIP Quality Analysis and Assessment -- Case Study 3: Mobile VoIP Applications and IMS.
Since the release of the first internet phone in 1995, the use of voice over internet protocol (VoIP) has grown exponentially, so that today it is an established and popular technology for real-time communications in both business and daily life. This Guide to Voice and Video over IP introduces the fundamental techniques underpinning the huge success and global penetration of VoIP. After highlighting the benefits and growing importance of VoIP, the text presents a review of the latest advances in speech and video compression, computer networking protocols, the assessment and monitoring of VoIP quality, and next generation network architectures for multimedia services. Numerous practical examples, complete with real trace data, illustrate and explain the concepts. The book also concludes with three case studies, each presenting easy-to-follow step-by-step instructions together with challenging hands-on exercises. Topics and features: Provides illustrative worked examples and end-of-chapter problems, enabling readers to check their understanding and stretch their knowledge Examines speech and video compression techniques, together with speech and video compression standards Describes the media transport protocols RTP and RTCP, as well as the VoIP signalling protocols SIP and SDP Discusses the concepts of VoIP quality of service and quality of experience Reviews next-generation networks based on the IP multimedia subsystem and mobile VoIP Presents case studies on building a VoIP system based on Asterisk, setting up a mobile VoIP system based on Open IMS and Android mobile, and analysing VoIP protocols and quality This teaching lab and classroom-tested textbook/guide is ideal for final-year undergraduate and first-year postgraduate courses in computer science and electronic engineering. Engineers in industry, and others with a general interest in VoIP, will also find this an invaluable practical reference. Dr. Lingfen Sun is Associate Professor (Reader) in Multimedia Communications and Networks at the School of Computing and Mathematics, University of Plymouth, UK. Dr. Emmanuel C. Ifeachor is Professor of Intelligent Electronic Systems and Head of the Signal Processing and Multimedia Communication research group at the University of Plymouth. Dr. Is-Haka Mkwawa and Dr. Emmanuel Jammeh are Research Fellows at the same institution.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447149057
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Speech Compression -- Video Compression -- Media Transport for VoIP -- VoIP Signalling – SIP -- VoIP Quality of Experience (QoE) -- IMS and Mobile VoIP -- Case Study 1: Building Up a VoIP System Based on Asterisk -- Case Study 2: VoIP Quality Analysis and Assessment -- Case Study 3: Mobile VoIP Applications and IMS.
Physical Description: XII, 269 p. 204 illus., 5 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-4905-7
Publication Date: 2013.


Title: Guide to Voice and Video over IP For Fixed and Mobile Networks / by Lingfen Sun, Is-Haka Mkwawa, Emmanuel Jammeh, Emmanuel Ifeachor.
Computer Communications and Networks,
Computer communications and networks,

Author: Sun, Lingfen. author.
Mkwawa, Is-Haka. author.
Jammeh, Emmanuel. author.
Ifeachor, Emmanuel. author.
SpringerLink (Online service)

General Notes: Introduction -- Speech Compression -- Video Compression -- Media Transport for VoIP -- VoIP Signalling – SIP -- VoIP Quality of Experience (QoE) -- IMS and Mobile VoIP -- Case Study 1: Building Up a VoIP System Based on Asterisk -- Case Study 2: VoIP Quality Analysis and Assessment -- Case Study 3: Mobile VoIP Applications and IMS.
Since the release of the first internet phone in 1995, the use of voice over internet protocol (VoIP) has grown exponentially, so that today it is an established and popular technology for real-time communications in both business and daily life. This Guide to Voice and Video over IP introduces the fundamental techniques underpinning the huge success and global penetration of VoIP. After highlighting the benefits and growing importance of VoIP, the text presents a review of the latest advances in speech and video compression, computer networking protocols, the assessment and monitoring of VoIP quality, and next generation network architectures for multimedia services. Numerous practical examples, complete with real trace data, illustrate and explain the concepts. The book also concludes with three case studies, each presenting easy-to-follow step-by-step instructions together with challenging hands-on exercises. Topics and features: Provides illustrative worked examples and end-of-chapter problems, enabling readers to check their understanding and stretch their knowledge Examines speech and video compression techniques, together with speech and video compression standards Describes the media transport protocols RTP and RTCP, as well as the VoIP signalling protocols SIP and SDP Discusses the concepts of VoIP quality of service and quality of experience Reviews next-generation networks based on the IP multimedia subsystem and mobile VoIP Presents case studies on building a VoIP system based on Asterisk, setting up a mobile VoIP system based on Open IMS and Android mobile, and analysing VoIP protocols and quality This teaching lab and classroom-tested textbook/guide is ideal for final-year undergraduate and first-year postgraduate courses in computer science and electronic engineering. Engineers in industry, and others with a general interest in VoIP, will also find this an invaluable practical reference. Dr. Lingfen Sun is Associate Professor (Reader) in Multimedia Communications and Networks at the School of Computing and Mathematics, University of Plymouth, UK. Dr. Emmanuel C. Ifeachor is Professor of Intelligent Electronic Systems and Head of the Signal Processing and Multimedia Communication research group at the University of Plymouth. Dr. Is-Haka Mkwawa and Dr. Emmanuel Jammeh are Research Fellows at the same institution.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447149057
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Speech Compression -- Video Compression -- Media Transport for VoIP -- VoIP Signalling – SIP -- VoIP Quality of Experience (QoE) -- IMS and Mobile VoIP -- Case Study 1: Building Up a VoIP System Based on Asterisk -- Case Study 2: VoIP Quality Analysis and Assessment -- Case Study 3: Mobile VoIP Applications and IMS.
Physical Description: XII, 269 p. 204 illus., 5 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-4905-7
Publication Date: 2013.


Title: Future Wireless and Optical Networks Networking Modes and Cross-Layer Design / by Shengming Jiang.
Computer Communications and Networks,
Computer communications and networks,

Author: Jiang, Shengming. author.
SpringerLink (Online service)

General Notes: Introduction and Overview -- Internet Development versus Networking Modes -- Two-Level Source Routing (TLSR) for All-Optical Packet Switching -- Networking with TLSR -- Differentiated Queueing Service (DQS) for Granular QoS -- Cost Model for Granular End-to-End QoS with DQS -- Quantitative End-to-End Arguments: Performance Analysis -- Quantitative End-to-End Arguments: Complexity Estimation -- Numerical Discussion of Quantitative End-to-End Arguments -- Decoupling Congestion Control from TCP: Semi-TCP -- Enabling Simultaneous MAC Transmission with MIMO: Logical MIMO -- Numerical Evaluation of MAC Schemes Based on Physical and Logical MIMO -- To Be Continued.
As the number of smart-phone applications and users continues to grow, the future Internet must integrate both optical wired networks and mobile wireless networks in order to meet the demands for pervasive computing and network capacity. This important text/reference reviews the challenges of all-optical and wireless networks for the future Internet. With a focus on cross-layer design and optimization, the book proposes a number of modifications to existing layered reference models, in addition to discussing revisions to current end-to-end arguments. The text also examines how these approaches can enhance the energy efficiency of the network. Topics and features: Presents a thorough introduction to major networking modes and their effect on Internet development Proposes a new structure favorable for all-optical packet switching Discusses a new quality of service (QoS) provisioning approach, which overcomes the scalability problem of IntServ and the coarse QoS granularity of DiffServ Describes the end-to-end arguments in Internet design, before investigating a solution to congestion control problems in multi-hop wireless and all-optical networks Examines how to exploit multiple-input-multiple-output technology to improve network performance in centralized wireless networks Surveys green networking strategies from a quantitative perspective Suggests a strategic vision for possible developments of network technology for the future Internet Presenting state-of-the-art research on new networking approaches, this text is a must-read for all researchers and practitioners interested in developing technologies for next-generation applications and the future Internet.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447128229
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction and Overview -- Internet Development versus Networking Modes -- Two-Level Source Routing (TLSR) for All-Optical Packet Switching -- Networking with TLSR -- Differentiated Queueing Service (DQS) for Granular QoS -- Cost Model for Granular End-to-End QoS with DQS -- Quantitative End-to-End Arguments: Performance Analysis -- Quantitative End-to-End Arguments: Complexity Estimation -- Numerical Discussion of Quantitative End-to-End Arguments -- Decoupling Congestion Control from TCP: Semi-TCP -- Enabling Simultaneous MAC Transmission with MIMO: Logical MIMO -- Numerical Evaluation of MAC Schemes Based on Physical and Logical MIMO -- To Be Continued.
Physical Description: XVIII, 248p. 80 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-2822-9
Publication Date: 2012.


Title: Future Wireless and Optical Networks Networking Modes and Cross-Layer Design / by Shengming Jiang.
Computer Communications and Networks,
Computer communications and networks,

Author: Jiang, Shengming. author.
SpringerLink (Online service)

General Notes: Introduction and Overview -- Internet Development versus Networking Modes -- Two-Level Source Routing (TLSR) for All-Optical Packet Switching -- Networking with TLSR -- Differentiated Queueing Service (DQS) for Granular QoS -- Cost Model for Granular End-to-End QoS with DQS -- Quantitative End-to-End Arguments: Performance Analysis -- Quantitative End-to-End Arguments: Complexity Estimation -- Numerical Discussion of Quantitative End-to-End Arguments -- Decoupling Congestion Control from TCP: Semi-TCP -- Enabling Simultaneous MAC Transmission with MIMO: Logical MIMO -- Numerical Evaluation of MAC Schemes Based on Physical and Logical MIMO -- To Be Continued.
As the number of smart-phone applications and users continues to grow, the future Internet must integrate both optical wired networks and mobile wireless networks in order to meet the demands for pervasive computing and network capacity. This important text/reference reviews the challenges of all-optical and wireless networks for the future Internet. With a focus on cross-layer design and optimization, the book proposes a number of modifications to existing layered reference models, in addition to discussing revisions to current end-to-end arguments. The text also examines how these approaches can enhance the energy efficiency of the network. Topics and features: Presents a thorough introduction to major networking modes and their effect on Internet development Proposes a new structure favorable for all-optical packet switching Discusses a new quality of service (QoS) provisioning approach, which overcomes the scalability problem of IntServ and the coarse QoS granularity of DiffServ Describes the end-to-end arguments in Internet design, before investigating a solution to congestion control problems in multi-hop wireless and all-optical networks Examines how to exploit multiple-input-multiple-output technology to improve network performance in centralized wireless networks Surveys green networking strategies from a quantitative perspective Suggests a strategic vision for possible developments of network technology for the future Internet Presenting state-of-the-art research on new networking approaches, this text is a must-read for all researchers and practitioners interested in developing technologies for next-generation applications and the future Internet.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447128229
Subject: Computer science.
Computer Communication Networks.
Computer science.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction and Overview -- Internet Development versus Networking Modes -- Two-Level Source Routing (TLSR) for All-Optical Packet Switching -- Networking with TLSR -- Differentiated Queueing Service (DQS) for Granular QoS -- Cost Model for Granular End-to-End QoS with DQS -- Quantitative End-to-End Arguments: Performance Analysis -- Quantitative End-to-End Arguments: Complexity Estimation -- Numerical Discussion of Quantitative End-to-End Arguments -- Decoupling Congestion Control from TCP: Semi-TCP -- Enabling Simultaneous MAC Transmission with MIMO: Logical MIMO -- Numerical Evaluation of MAC Schemes Based on Physical and Logical MIMO -- To Be Continued.
Physical Description: XVIII, 248p. 80 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-2822-9
Publication Date: 2012.


Title: Social Media Retrieval edited by Naeem Ramzan, Roelof Zwol, Jong-Seok Lee, Kai Clüver, Xian-Sheng Hua.
Computer Communications and Networks,
Computer communications and networks,

Author: Ramzan, Naeem. editor.
Zwol, Roelof. editor.
Lee, Jong-Seok. editor.
Clüver, Kai. editor.
Hua, Xian-Sheng. editor.
SpringerLink (Online service)

General Notes: Part I: Fundamentals of Social Media -- Social Video Retrieval -- Social Media Recommendation -- Multimedia Indexing, Search and Retrieval in Large Databases of Social Networks -- Survey on Social Community Detection -- Detecting Multimedia Contents of Social Events in Social Networks -- Part II: Tagging of Social Media -- Georeferencing in Social Networks -- Predicting User Tags in Social Media Repositories Using Semantic Expansion and Visual Analysis -- A Rule-Based Flickr Tag Recommendation System -- Sentic Computing for Social Media Analysis, Representation, and Retrieval -- Highlights Detection in Movie Scenes Through Inter-Users Physiological Linkage -- Towards Emotional Annotation of Multimedia Contents -- Part III: Privacy and Personalisation of Social Media -- Privacy in Recommender Systems -- Geotag Propagation with User Trust Modelling -- Context Aware Content Adaptation for Personalised Social Media Access -- Part IV: Applications and Services -- Progression in Social Media: How PetaMedia Facilitate? -- Video Technology for Storage and Distribution of Personalised Media -- Social Aware TV Content Delivery over Intelligent Networks -- Distributed Media Synchronization for Shared Video Watching -- eGuided: Sharing Media in Academic and Social Networks based on Peer-Assisted Learning e-Portfolios -- Exploiting Social Media for Music Information Retrieval.
Social media is now ubiquitous on the internet, generating both new possibilities and new challenges in information analysis and retrieval. This comprehensive text/reference examines in depth the synergy between multimedia content analysis, personalization, and next-generation networking. The book demonstrates how this integration can result in robust, personalized services that provide users with an improved multimedia-centric quality of experience. Each chapter offers a practical step-by-step walkthrough for a variety of concepts, components and technologies relating to the development of applications and services. Topics and features: Provides contributions from an international and interdisciplinary selection of experts in their fields Introduces the fundamentals of social media retrieval, presenting the most important areas of research in this domain Examines the important topic of multimedia tagging in social environments, including geo-tagging Discusses issues of personalization and privacy in social media Reviews advances in encoding, compression and network architectures for the exchange of social media information Describes a range of applications related to social media Researchers and students interested in social media retrieval will find this book a valuable resource, covering a broad overview of state-of-the-art research and emerging trends in this area. The text will also be of use to practicing engineers involved in envisioning and building innovative social media applications and services.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447145554
Subject: Computer science.
Computer Communication Networks.
Information storage and retrieval systems.
Multimedia systems.
Optical pattern recognition.
Computer science.
Computer Communication Networks.
Multimedia Information Systems.
Pattern Recognition.
User Interfaces and Human Computer Interaction.
Information Systems Applications (incl.Internet).
Information Storage and Retrieval.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Fundamentals of Social Media -- Social Video Retrieval -- Social Media Recommendation -- Multimedia Indexing, Search and Retrieval in Large Databases of Social Networks -- Survey on Social Community Detection -- Detecting Multimedia Contents of Social Events in Social Networks -- Part II: Tagging of Social Media -- Georeferencing in Social Networks -- Predicting User Tags in Social Media Repositories Using Semantic Expansion and Visual Analysis -- A Rule-Based Flickr Tag Recommendation System -- Sentic Computing for Social Media Analysis, Representation, and Retrieval -- Highlights Detection in Movie Scenes Through Inter-Users Physiological Linkage -- Towards Emotional Annotation of Multimedia Contents -- Part III: Privacy and Personalisation of Social Media -- Privacy in Recommender Systems -- Geotag Propagation with User Trust Modelling -- Context Aware Content Adaptation for Personalised Social Media Access -- Part IV: Applications and Services -- Progression in Social Media: How PetaMedia Facilitate? -- Video Technology for Storage and Distribution of Personalised Media -- Social Aware TV Content Delivery over Intelligent Networks -- Distributed Media Synchronization for Shared Video Watching -- eGuided: Sharing Media in Academic and Social Networks based on Peer-Assisted Learning e-Portfolios -- Exploiting Social Media for Music Information Retrieval.
Physical Description: XI, 484 p. 114 illus., 5 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-4555-4
Publication Date: 2013.


Title: Social Media Retrieval edited by Naeem Ramzan, Roelof Zwol, Jong-Seok Lee, Kai Clüver, Xian-Sheng Hua.
Computer Communications and Networks,
Computer communications and networks,

Author: Ramzan, Naeem. editor.
Zwol, Roelof. editor.
Lee, Jong-Seok. editor.
Clüver, Kai. editor.
Hua, Xian-Sheng. editor.
SpringerLink (Online service)

General Notes: Part I: Fundamentals of Social Media -- Social Video Retrieval -- Social Media Recommendation -- Multimedia Indexing, Search and Retrieval in Large Databases of Social Networks -- Survey on Social Community Detection -- Detecting Multimedia Contents of Social Events in Social Networks -- Part II: Tagging of Social Media -- Georeferencing in Social Networks -- Predicting User Tags in Social Media Repositories Using Semantic Expansion and Visual Analysis -- A Rule-Based Flickr Tag Recommendation System -- Sentic Computing for Social Media Analysis, Representation, and Retrieval -- Highlights Detection in Movie Scenes Through Inter-Users Physiological Linkage -- Towards Emotional Annotation of Multimedia Contents -- Part III: Privacy and Personalisation of Social Media -- Privacy in Recommender Systems -- Geotag Propagation with User Trust Modelling -- Context Aware Content Adaptation for Personalised Social Media Access -- Part IV: Applications and Services -- Progression in Social Media: How PetaMedia Facilitate? -- Video Technology for Storage and Distribution of Personalised Media -- Social Aware TV Content Delivery over Intelligent Networks -- Distributed Media Synchronization for Shared Video Watching -- eGuided: Sharing Media in Academic and Social Networks based on Peer-Assisted Learning e-Portfolios -- Exploiting Social Media for Music Information Retrieval.
Social media is now ubiquitous on the internet, generating both new possibilities and new challenges in information analysis and retrieval. This comprehensive text/reference examines in depth the synergy between multimedia content analysis, personalization, and next-generation networking. The book demonstrates how this integration can result in robust, personalized services that provide users with an improved multimedia-centric quality of experience. Each chapter offers a practical step-by-step walkthrough for a variety of concepts, components and technologies relating to the development of applications and services. Topics and features: Provides contributions from an international and interdisciplinary selection of experts in their fields Introduces the fundamentals of social media retrieval, presenting the most important areas of research in this domain Examines the important topic of multimedia tagging in social environments, including geo-tagging Discusses issues of personalization and privacy in social media Reviews advances in encoding, compression and network architectures for the exchange of social media information Describes a range of applications related to social media Researchers and students interested in social media retrieval will find this book a valuable resource, covering a broad overview of state-of-the-art research and emerging trends in this area. The text will also be of use to practicing engineers involved in envisioning and building innovative social media applications and services.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447145554
Subject: Computer science.
Computer Communication Networks.
Information storage and retrieval systems.
Multimedia systems.
Optical pattern recognition.
Computer science.
Computer Communication Networks.
Multimedia Information Systems.
Pattern Recognition.
User Interfaces and Human Computer Interaction.
Information Systems Applications (incl.Internet).
Information Storage and Retrieval.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Fundamentals of Social Media -- Social Video Retrieval -- Social Media Recommendation -- Multimedia Indexing, Search and Retrieval in Large Databases of Social Networks -- Survey on Social Community Detection -- Detecting Multimedia Contents of Social Events in Social Networks -- Part II: Tagging of Social Media -- Georeferencing in Social Networks -- Predicting User Tags in Social Media Repositories Using Semantic Expansion and Visual Analysis -- A Rule-Based Flickr Tag Recommendation System -- Sentic Computing for Social Media Analysis, Representation, and Retrieval -- Highlights Detection in Movie Scenes Through Inter-Users Physiological Linkage -- Towards Emotional Annotation of Multimedia Contents -- Part III: Privacy and Personalisation of Social Media -- Privacy in Recommender Systems -- Geotag Propagation with User Trust Modelling -- Context Aware Content Adaptation for Personalised Social Media Access -- Part IV: Applications and Services -- Progression in Social Media: How PetaMedia Facilitate? -- Video Technology for Storage and Distribution of Personalised Media -- Social Aware TV Content Delivery over Intelligent Networks -- Distributed Media Synchronization for Shared Video Watching -- eGuided: Sharing Media in Academic and Social Networks based on Peer-Assisted Learning e-Portfolios -- Exploiting Social Media for Music Information Retrieval.
Physical Description: XI, 484 p. 114 illus., 5 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-4555-4
Publication Date: 2013.


Title: Guide to Cloud Computing Principles and Practice / by Richard Hill, Laurie Hirsch, Peter Lake, Siavash Moshiri.
Computer Communications and Networks,
Computer communications and networks,

Author: Hill, Richard. author.
Hirsch, Laurie. author.
Lake, Peter. author.
Moshiri, Siavash. author.
SpringerLink (Online service)

General Notes: Part I: Cloud Computing Fundamentals -- Introduction to Cloud Computing -- Business Adoption Models and Legal Aspects of the Cloud -- Social, Economic and Political Aspects of the Cloud -- Part II: Technological Context -- Cloud Technology -- Cloud Services -- Data in the Cloud -- Cloud and Web Intelligence -- Part III: Business Context -- Investment Appraisal -- Enterprise Cloud Computing -- Security and Governance -- Cloud Roadmap -- Challenges and the Future.
Cloud computing platforms can allow organizations to become more efficient and more responsive to users of both internal and external systems, yet a clear understanding is needed in order to separate the facts from the hype behind this new and rapidly expanding area. This Guide to Cloud Computing describes the landscape of cloud computing from first principles, leading the reader step-by-step through the process of building and configuring a cloud environment. The book not only considers the technologies for designing and creating cloud computing platforms, but also the business models and frameworks in real-world implementation of cloud platforms. Emphasis is placed on “learning by doing,” and readers are encouraged to experiment with a range of different tools and approaches. Topics and features: Includes review questions, hands-on exercises, study activities and discussion topics throughout the text Describes the key technologies involved in cloud computing Explores the use of cloud computing in business environments Demonstrates the approaches used to build cloud computing infrastructures Reviews the social, economic, and political aspects of the on-going growth in cloud computing use Discusses legal and security concerns in cloud computing Examines techniques for the appraisal of financial investment into cloud computing Identifies areas for further research within this rapidly-moving field This easy-to-follow and highly practical textbook/guide is an invaluable resource for advanced undergraduate and postgraduate students of software engineering, computer networking and related courses. The extensive worked examples will also appeal greatly to researchers, IT infrastructure technicians and application developers.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447146032
Subject: Computer science.
Computer network architectures.
Data structures (Computer Science).
Data encryption (Computer science).
Computer science.
Computer System Implementation.
Information Systems Applications (incl.Internet).
Data structures.
Programming Techniques.
Data Storage Representation.
Data encryption.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Cloud Computing Fundamentals -- Introduction to Cloud Computing -- Business Adoption Models and Legal Aspects of the Cloud -- Social, Economic and Political Aspects of the Cloud -- Part II: Technological Context -- Cloud Technology -- Cloud Services -- Data in the Cloud -- Cloud and Web Intelligence -- Part III: Business Context -- Investment Appraisal -- Enterprise Cloud Computing -- Security and Governance -- Cloud Roadmap -- Challenges and the Future.
Physical Description: XXI, 278 p. 38 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-4603-2
Publication Date: 2013.


Title: Guide to Cloud Computing Principles and Practice / by Richard Hill, Laurie Hirsch, Peter Lake, Siavash Moshiri.
Computer Communications and Networks,
Computer communications and networks,

Author: Hill, Richard. author.
Hirsch, Laurie. author.
Lake, Peter. author.
Moshiri, Siavash. author.
SpringerLink (Online service)

General Notes: Part I: Cloud Computing Fundamentals -- Introduction to Cloud Computing -- Business Adoption Models and Legal Aspects of the Cloud -- Social, Economic and Political Aspects of the Cloud -- Part II: Technological Context -- Cloud Technology -- Cloud Services -- Data in the Cloud -- Cloud and Web Intelligence -- Part III: Business Context -- Investment Appraisal -- Enterprise Cloud Computing -- Security and Governance -- Cloud Roadmap -- Challenges and the Future.
Cloud computing platforms can allow organizations to become more efficient and more responsive to users of both internal and external systems, yet a clear understanding is needed in order to separate the facts from the hype behind this new and rapidly expanding area. This Guide to Cloud Computing describes the landscape of cloud computing from first principles, leading the reader step-by-step through the process of building and configuring a cloud environment. The book not only considers the technologies for designing and creating cloud computing platforms, but also the business models and frameworks in real-world implementation of cloud platforms. Emphasis is placed on “learning by doing,” and readers are encouraged to experiment with a range of different tools and approaches. Topics and features: Includes review questions, hands-on exercises, study activities and discussion topics throughout the text Describes the key technologies involved in cloud computing Explores the use of cloud computing in business environments Demonstrates the approaches used to build cloud computing infrastructures Reviews the social, economic, and political aspects of the on-going growth in cloud computing use Discusses legal and security concerns in cloud computing Examines techniques for the appraisal of financial investment into cloud computing Identifies areas for further research within this rapidly-moving field This easy-to-follow and highly practical textbook/guide is an invaluable resource for advanced undergraduate and postgraduate students of software engineering, computer networking and related courses. The extensive worked examples will also appeal greatly to researchers, IT infrastructure technicians and application developers.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447146032
Subject: Computer science.
Computer network architectures.
Data structures (Computer Science).
Data encryption (Computer science).
Computer science.
Computer System Implementation.
Information Systems Applications (incl.Internet).
Data structures.
Programming Techniques.
Data Storage Representation.
Data encryption.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Cloud Computing Fundamentals -- Introduction to Cloud Computing -- Business Adoption Models and Legal Aspects of the Cloud -- Social, Economic and Political Aspects of the Cloud -- Part II: Technological Context -- Cloud Technology -- Cloud Services -- Data in the Cloud -- Cloud and Web Intelligence -- Part III: Business Context -- Investment Appraisal -- Enterprise Cloud Computing -- Security and Governance -- Cloud Roadmap -- Challenges and the Future.
Physical Description: XXI, 278 p. 38 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-4603-2
Publication Date: 2013.


Title: Software Engineering Frameworks for the Cloud Computing Paradigm edited by Zaigham Mahmood, Saqib Saeed.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
Saeed, Saqib. editor.
SpringerLink (Online service)

General Notes: Part I: Impact of the Cloud Paradigm on Software Engineering -- Impact of the Semantic Web and Cloud Computing Platforms on Software Engineering -- Envisioning Cloud-Induced Transformations in the Software Engineering Discipline -- Limitations and Challenges in Cloud-Based Applications Development -- Part II: Software Development Life Cycles for Cloud Platforms -- Impact of Cloud Services on Software Development Life Cycles -- Cloud-Based Development Using Classic Life Cycle Models -- Business Requirements Engineering for Developing Cloud Computing Services -- Testing Perspectives for Cloud-Based Applications -- Testing in the Cloud -- Part III: Software Design Strategies for Cloud Adoption -- Feature-Driven Design of SaaS Architectures -- Impact of Cloud Adoption on Agile Software Development -- Technical Strategies and Architectural Patterns for Migrating Legacy Systems to the Cloud -- Cloud-Aided Software Engineering -- Development of Cloud Applications in Hybrid Clouds with Support for Multi-Scheduling -- Part IV: Performance of Cloud-Based Software Applications -- Efficient Practices and Frameworks for Cloud-Based Applications Development -- A Methodology for Identifying the Relationships Between Performance Factors for Cloud Computing Applications.
With the emergence of cloud computing, traditional approaches to software engineering must be adapted in order to take full advantage of the benefits promised by cloud technologies. This timely and authoritative text/reference presents the latest research on Software Engineering Frameworks for the Cloud Computing Paradigm, drawn from an international selection of researchers and practitioners. The book offers both a discussion of relevant software engineering approaches and practical guidance on enterprise-wide software deployment in the cloud environment, together with real-world case studies. Topics and features: Presents the state of the art in software engineering approaches for developing cloud-suitable applications Discusses the impact of the cloud computing paradigm on software engineering, including the semantic web Offers guidance and best practices for students and practitioners of cloud-based applications architecture Examines the stages of the software development lifecycle, with a focus on the requirements engineering and testing of cloud-based applications Reviews the efficiency and performance of cloud-based applications Explores feature-driven and cloud-aided software design, presenting strategies for cloud adoption and migration Provides relevant theoretical frameworks, practical approaches and current and future research directions This practical and clearly-structured volume is an ideal self-study primer for students of cloud computing and software engineering. Software engineers, application developers and IT infrastructure managers will also find the work to be an invaluable reference. Dr. Zaigham Mahmood is a researcher in the School of Computing at the University of Derby, UK, and a Senior Technology Consultant at Debesis Education. His other publications include the successful Springer book Cloud Computing for Enterprise Architectures. Dr. Saqib Saeed is an Assistant Professor in the Computer Science Department at Bahria University, Islamabad, Pakistan.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447150312
Subject: Computer science.
Computer Communication Networks.
Software engineering.
Management information systems.
Computer science.
Computer Communication Networks.
Software engineering.
Business information systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Impact of the Cloud Paradigm on Software Engineering -- Impact of the Semantic Web and Cloud Computing Platforms on Software Engineering -- Envisioning Cloud-Induced Transformations in the Software Engineering Discipline -- Limitations and Challenges in Cloud-Based Applications Development -- Part II: Software Development Life Cycles for Cloud Platforms -- Impact of Cloud Services on Software Development Life Cycles -- Cloud-Based Development Using Classic Life Cycle Models -- Business Requirements Engineering for Developing Cloud Computing Services -- Testing Perspectives for Cloud-Based Applications -- Testing in the Cloud -- Part III: Software Design Strategies for Cloud Adoption -- Feature-Driven Design of SaaS Architectures -- Impact of Cloud Adoption on Agile Software Development -- Technical Strategies and Architectural Patterns for Migrating Legacy Systems to the Cloud -- Cloud-Aided Software Engineering -- Development of Cloud Applications in Hybrid Clouds with Support for Multi-Scheduling -- Part IV: Performance of Cloud-Based Software Applications -- Efficient Practices and Frameworks for Cloud-Based Applications Development -- A Methodology for Identifying the Relationships Between Performance Factors for Cloud Computing Applications.
Physical Description: XVIII, 365 p. 112 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-5031-2
Publication Date: 2013.


Title: Software Engineering Frameworks for the Cloud Computing Paradigm edited by Zaigham Mahmood, Saqib Saeed.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
Saeed, Saqib. editor.
SpringerLink (Online service)

General Notes: Part I: Impact of the Cloud Paradigm on Software Engineering -- Impact of the Semantic Web and Cloud Computing Platforms on Software Engineering -- Envisioning Cloud-Induced Transformations in the Software Engineering Discipline -- Limitations and Challenges in Cloud-Based Applications Development -- Part II: Software Development Life Cycles for Cloud Platforms -- Impact of Cloud Services on Software Development Life Cycles -- Cloud-Based Development Using Classic Life Cycle Models -- Business Requirements Engineering for Developing Cloud Computing Services -- Testing Perspectives for Cloud-Based Applications -- Testing in the Cloud -- Part III: Software Design Strategies for Cloud Adoption -- Feature-Driven Design of SaaS Architectures -- Impact of Cloud Adoption on Agile Software Development -- Technical Strategies and Architectural Patterns for Migrating Legacy Systems to the Cloud -- Cloud-Aided Software Engineering -- Development of Cloud Applications in Hybrid Clouds with Support for Multi-Scheduling -- Part IV: Performance of Cloud-Based Software Applications -- Efficient Practices and Frameworks for Cloud-Based Applications Development -- A Methodology for Identifying the Relationships Between Performance Factors for Cloud Computing Applications.
With the emergence of cloud computing, traditional approaches to software engineering must be adapted in order to take full advantage of the benefits promised by cloud technologies. This timely and authoritative text/reference presents the latest research on Software Engineering Frameworks for the Cloud Computing Paradigm, drawn from an international selection of researchers and practitioners. The book offers both a discussion of relevant software engineering approaches and practical guidance on enterprise-wide software deployment in the cloud environment, together with real-world case studies. Topics and features: Presents the state of the art in software engineering approaches for developing cloud-suitable applications Discusses the impact of the cloud computing paradigm on software engineering, including the semantic web Offers guidance and best practices for students and practitioners of cloud-based applications architecture Examines the stages of the software development lifecycle, with a focus on the requirements engineering and testing of cloud-based applications Reviews the efficiency and performance of cloud-based applications Explores feature-driven and cloud-aided software design, presenting strategies for cloud adoption and migration Provides relevant theoretical frameworks, practical approaches and current and future research directions This practical and clearly-structured volume is an ideal self-study primer for students of cloud computing and software engineering. Software engineers, application developers and IT infrastructure managers will also find the work to be an invaluable reference. Dr. Zaigham Mahmood is a researcher in the School of Computing at the University of Derby, UK, and a Senior Technology Consultant at Debesis Education. His other publications include the successful Springer book Cloud Computing for Enterprise Architectures. Dr. Saqib Saeed is an Assistant Professor in the Computer Science Department at Bahria University, Islamabad, Pakistan.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447150312
Subject: Computer science.
Computer Communication Networks.
Software engineering.
Management information systems.
Computer science.
Computer Communication Networks.
Software engineering.
Business information systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Impact of the Cloud Paradigm on Software Engineering -- Impact of the Semantic Web and Cloud Computing Platforms on Software Engineering -- Envisioning Cloud-Induced Transformations in the Software Engineering Discipline -- Limitations and Challenges in Cloud-Based Applications Development -- Part II: Software Development Life Cycles for Cloud Platforms -- Impact of Cloud Services on Software Development Life Cycles -- Cloud-Based Development Using Classic Life Cycle Models -- Business Requirements Engineering for Developing Cloud Computing Services -- Testing Perspectives for Cloud-Based Applications -- Testing in the Cloud -- Part III: Software Design Strategies for Cloud Adoption -- Feature-Driven Design of SaaS Architectures -- Impact of Cloud Adoption on Agile Software Development -- Technical Strategies and Architectural Patterns for Migrating Legacy Systems to the Cloud -- Cloud-Aided Software Engineering -- Development of Cloud Applications in Hybrid Clouds with Support for Multi-Scheduling -- Part IV: Performance of Cloud-Based Software Applications -- Efficient Practices and Frameworks for Cloud-Based Applications Development -- A Methodology for Identifying the Relationships Between Performance Factors for Cloud Computing Applications.
Physical Description: XVIII, 365 p. 112 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-5031-2
Publication Date: 2013.


Title: Cloud Computing Methods and Practical Approaches / edited by Zaigham Mahmood.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
SpringerLink (Online service)

General Notes: Part I: Cloud Infrastructures and Frameworks -- Metadata-Based Frameworks in the Context of Cloud Computing -- Architecting Scientific Data Systems in the Cloud -- Social, Dynamic and Custom-Based Clouds -- Consumer Cloud -- Part II: Cloud Enablement and Management -- Role of Service Brokers in Cloud Computing -- Resource and Scheduling Management in the Cloud Computing Application Paradigm -- Management Infrastructures for Power-Efficient Cloud Computing Architectures -- Part III: Cloud Perspectives and Patterns -- Cloud Computing: A Mobile Context-Awareness Perspective -- Potential Concerns and Common Benefits of Cloud-Based Enterprise Resource Planning -- Cloud Computing Solution Patterns: Infrastructural Solutions -- Cloud Computing Solution Patterns: Application and Platform Solutions -- Part IV: Cloud Modernization and Migration -- Cloud Application Modernization and Migration Methodology -- An Assessment Tool to Prepare the Leap to the Cloud -- Leveraging the Potential of the Cloud for Software Performance Testing -- Open Source Cloudware Support for the Portability of Applications using Cloud Infrastructure Services.
The benefits associated with cloud computing are enormous; yet the dynamic, virtualized, distributed and multi-tenant nature of the cloud environment presents many challenges. To help tackle these challenges, Cloud Computing: Methods and Practical Approaches provides illuminating viewpoints and helpful case studies, supplied by an international selection of pre-eminent authorities from both industry and academia. This comprehensive text/reference presents both state-of-the-art research developments and practical guidance on approaches, technologies and frameworks for the emerging cloud paradigm. Topics and features: Presents the state of the art in cloud technologies, infrastructures, and service delivery and deployment models Discusses relevant theoretical frameworks, practical approaches and suggested methodologies Offers guidance and best practices for the development of cloud-based services and infrastructures, and examines management aspects of cloud computing Reviews consumer perspectives on mobile cloud computing and cloud-based enterprise resource planning Explores software performance testing, open-source cloudware support, and assessment methodologies for modernization, migration and pre-migration Describes emerging new methodologies relevant to the cloud paradigm, and provides suggestions for future developments and research directions This timely volume is ideal for use both as a primer/textbook for students of cloud computing, and as a professional reference for software architects, infrastructure specialists and other cloud practitioners. A program of study for a 12-week teaching semester is suggested in the Preface. Dr. Zaigham Mahmood is a researcher at the University of Derby UK, a Senior Technology Consultant at Debesis Education, and Foreign Professor at NUST Islamabad, Pakistan. His other publications include the successful Springer books Cloud Computing for Enterprise Architectures and Software Engineering Frameworks for the Cloud Computing Paradigm.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447151074
Subject: Computer science.
Computer Communication Networks.
Software engineering.
Management information systems.
Computer science.
Computer Communication Networks.
Software engineering.
Business information systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Cloud Infrastructures and Frameworks -- Metadata-Based Frameworks in the Context of Cloud Computing -- Architecting Scientific Data Systems in the Cloud -- Social, Dynamic and Custom-Based Clouds -- Consumer Cloud -- Part II: Cloud Enablement and Management -- Role of Service Brokers in Cloud Computing -- Resource and Scheduling Management in the Cloud Computing Application Paradigm -- Management Infrastructures for Power-Efficient Cloud Computing Architectures -- Part III: Cloud Perspectives and Patterns -- Cloud Computing: A Mobile Context-Awareness Perspective -- Potential Concerns and Common Benefits of Cloud-Based Enterprise Resource Planning -- Cloud Computing Solution Patterns: Infrastructural Solutions -- Cloud Computing Solution Patterns: Application and Platform Solutions -- Part IV: Cloud Modernization and Migration -- Cloud Application Modernization and Migration Methodology -- An Assessment Tool to Prepare the Leap to the Cloud -- Leveraging the Potential of the Cloud for Software Performance Testing -- Open Source Cloudware Support for the Portability of Applications using Cloud Infrastructure Services.
Physical Description: XVII, 347 p. 97 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-5107-4
Publication Date: 2013.


Title: Cloud Computing Methods and Practical Approaches / edited by Zaigham Mahmood.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
SpringerLink (Online service)

General Notes: Part I: Cloud Infrastructures and Frameworks -- Metadata-Based Frameworks in the Context of Cloud Computing -- Architecting Scientific Data Systems in the Cloud -- Social, Dynamic and Custom-Based Clouds -- Consumer Cloud -- Part II: Cloud Enablement and Management -- Role of Service Brokers in Cloud Computing -- Resource and Scheduling Management in the Cloud Computing Application Paradigm -- Management Infrastructures for Power-Efficient Cloud Computing Architectures -- Part III: Cloud Perspectives and Patterns -- Cloud Computing: A Mobile Context-Awareness Perspective -- Potential Concerns and Common Benefits of Cloud-Based Enterprise Resource Planning -- Cloud Computing Solution Patterns: Infrastructural Solutions -- Cloud Computing Solution Patterns: Application and Platform Solutions -- Part IV: Cloud Modernization and Migration -- Cloud Application Modernization and Migration Methodology -- An Assessment Tool to Prepare the Leap to the Cloud -- Leveraging the Potential of the Cloud for Software Performance Testing -- Open Source Cloudware Support for the Portability of Applications using Cloud Infrastructure Services.
The benefits associated with cloud computing are enormous; yet the dynamic, virtualized, distributed and multi-tenant nature of the cloud environment presents many challenges. To help tackle these challenges, Cloud Computing: Methods and Practical Approaches provides illuminating viewpoints and helpful case studies, supplied by an international selection of pre-eminent authorities from both industry and academia. This comprehensive text/reference presents both state-of-the-art research developments and practical guidance on approaches, technologies and frameworks for the emerging cloud paradigm. Topics and features: Presents the state of the art in cloud technologies, infrastructures, and service delivery and deployment models Discusses relevant theoretical frameworks, practical approaches and suggested methodologies Offers guidance and best practices for the development of cloud-based services and infrastructures, and examines management aspects of cloud computing Reviews consumer perspectives on mobile cloud computing and cloud-based enterprise resource planning Explores software performance testing, open-source cloudware support, and assessment methodologies for modernization, migration and pre-migration Describes emerging new methodologies relevant to the cloud paradigm, and provides suggestions for future developments and research directions This timely volume is ideal for use both as a primer/textbook for students of cloud computing, and as a professional reference for software architects, infrastructure specialists and other cloud practitioners. A program of study for a 12-week teaching semester is suggested in the Preface. Dr. Zaigham Mahmood is a researcher at the University of Derby UK, a Senior Technology Consultant at Debesis Education, and Foreign Professor at NUST Islamabad, Pakistan. His other publications include the successful Springer books Cloud Computing for Enterprise Architectures and Software Engineering Frameworks for the Cloud Computing Paradigm.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447151074
Subject: Computer science.
Computer Communication Networks.
Software engineering.
Management information systems.
Computer science.
Computer Communication Networks.
Software engineering.
Business information systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Cloud Infrastructures and Frameworks -- Metadata-Based Frameworks in the Context of Cloud Computing -- Architecting Scientific Data Systems in the Cloud -- Social, Dynamic and Custom-Based Clouds -- Consumer Cloud -- Part II: Cloud Enablement and Management -- Role of Service Brokers in Cloud Computing -- Resource and Scheduling Management in the Cloud Computing Application Paradigm -- Management Infrastructures for Power-Efficient Cloud Computing Architectures -- Part III: Cloud Perspectives and Patterns -- Cloud Computing: A Mobile Context-Awareness Perspective -- Potential Concerns and Common Benefits of Cloud-Based Enterprise Resource Planning -- Cloud Computing Solution Patterns: Infrastructural Solutions -- Cloud Computing Solution Patterns: Application and Platform Solutions -- Part IV: Cloud Modernization and Migration -- Cloud Application Modernization and Migration Methodology -- An Assessment Tool to Prepare the Leap to the Cloud -- Leveraging the Potential of the Cloud for Software Performance Testing -- Open Source Cloudware Support for the Portability of Applications using Cloud Infrastructure Services.
Physical Description: XVII, 347 p. 97 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-5107-4
Publication Date: 2013.


Title: Continued Rise of the Cloud Advances and Trends in Cloud Computing / edited by Zaigham Mahmood.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
SpringerLink (Online service)

General Notes: Part I: Access Control Mechanisms and Cloud Security -- Towards a GPU Cloud -- Taxonomy and Classification of Access Control Models for Cloud Environments -- Access Control as a Service in Cloud -- Part II: Standards, Brokerage Services and Certification -- Realization of Open Cloud Computing Standards, Forums and Platforms -- Role of Broker in InterCloud Environment -- Patterns of Trust -- Part III: Frameworks for ERP, Big Data and Interoperability -- A Framework for Evaluating Cloud Enterprise Resource Planning (ERP) Systems -- DIPAR: A Framework for Implementing Big Data Science in Organizations -- A Framework for Cloud Interoperability Based on Compliance and Conformance -- Part IV: Management, Governance and Capability Assessment -- Survey of Elasticity Management Solutions in Cloud Computing -- From Cloud Management to Cloud Governance -- Towards the Development of a Cloud Service Capability Assessment Framework -- Part V: Applications in Education and Other Scenarios -- Cloud Computing within Higher Education -- Cloud Computing Environment for e-Learning Services for Students with Disabilities -- Application Scenarios Suitable For Deployment in Cloud Environments.
Cloud computing is no-longer a novel paradigm, but instead an increasingly robust and established technology, yet new developments continue to emerge in this area. Continued Rise of the Cloud: Advances and Trends in Cloud Computing captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The book provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of expert researchers and practitioners. A careful analysis is provided of relevant theoretical frameworks, practical approaches, and current methodologies. Topics and features: Presents a focus on security and access control mechanisms for cloud environments, analyses standards and brokerage services, and investigates the role of certification for cloud adoption Evaluates cloud ERP, suggests a framework for implementing “big data” science, and proposes an approach for cloud interoperability based on compliance and conformance Reviews existing elasticity management solutions, discusses the relationship between cloud management and governance, and describes the development of a cloud service capability assessment model Examines cloud applications in higher education, including the use of knowledge-as-a-service in the provision of education, and cloud-based e-learning for students with disabilities This authoritative text/reference is essential reading for students, lecturers and researchers seeking insight into the cutting edge of cloud computing. Software developers, enterprise architects and IT infrastructure managers will also find this work to be both useful and enlightening.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447164524
Subject: Computer science.
Computer communication systems.
Computer security.
Computer science.
Computer Communication Networks.
Systems and Data Security.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Access Control Mechanisms and Cloud Security -- Towards a GPU Cloud -- Taxonomy and Classification of Access Control Models for Cloud Environments -- Access Control as a Service in Cloud -- Part II: Standards, Brokerage Services and Certification -- Realization of Open Cloud Computing Standards, Forums and Platforms -- Role of Broker in InterCloud Environment -- Patterns of Trust -- Part III: Frameworks for ERP, Big Data and Interoperability -- A Framework for Evaluating Cloud Enterprise Resource Planning (ERP) Systems -- DIPAR: A Framework for Implementing Big Data Science in Organizations -- A Framework for Cloud Interoperability Based on Compliance and Conformance -- Part IV: Management, Governance and Capability Assessment -- Survey of Elasticity Management Solutions in Cloud Computing -- From Cloud Management to Cloud Governance -- Towards the Development of a Cloud Service Capability Assessment Framework -- Part V: Applications in Education and Other Scenarios -- Cloud Computing within Higher Education -- Cloud Computing Environment for e-Learning Services for Students with Disabilities -- Application Scenarios Suitable For Deployment in Cloud Environments.
Physical Description: XIX, 410 p. 98 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-6452-4
Publication Date: 2014.


Title: Continued Rise of the Cloud Advances and Trends in Cloud Computing / edited by Zaigham Mahmood.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
SpringerLink (Online service)

General Notes: Part I: Access Control Mechanisms and Cloud Security -- Towards a GPU Cloud -- Taxonomy and Classification of Access Control Models for Cloud Environments -- Access Control as a Service in Cloud -- Part II: Standards, Brokerage Services and Certification -- Realization of Open Cloud Computing Standards, Forums and Platforms -- Role of Broker in InterCloud Environment -- Patterns of Trust -- Part III: Frameworks for ERP, Big Data and Interoperability -- A Framework for Evaluating Cloud Enterprise Resource Planning (ERP) Systems -- DIPAR: A Framework for Implementing Big Data Science in Organizations -- A Framework for Cloud Interoperability Based on Compliance and Conformance -- Part IV: Management, Governance and Capability Assessment -- Survey of Elasticity Management Solutions in Cloud Computing -- From Cloud Management to Cloud Governance -- Towards the Development of a Cloud Service Capability Assessment Framework -- Part V: Applications in Education and Other Scenarios -- Cloud Computing within Higher Education -- Cloud Computing Environment for e-Learning Services for Students with Disabilities -- Application Scenarios Suitable For Deployment in Cloud Environments.
Cloud computing is no-longer a novel paradigm, but instead an increasingly robust and established technology, yet new developments continue to emerge in this area. Continued Rise of the Cloud: Advances and Trends in Cloud Computing captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The book provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of expert researchers and practitioners. A careful analysis is provided of relevant theoretical frameworks, practical approaches, and current methodologies. Topics and features: Presents a focus on security and access control mechanisms for cloud environments, analyses standards and brokerage services, and investigates the role of certification for cloud adoption Evaluates cloud ERP, suggests a framework for implementing “big data” science, and proposes an approach for cloud interoperability based on compliance and conformance Reviews existing elasticity management solutions, discusses the relationship between cloud management and governance, and describes the development of a cloud service capability assessment model Examines cloud applications in higher education, including the use of knowledge-as-a-service in the provision of education, and cloud-based e-learning for students with disabilities This authoritative text/reference is essential reading for students, lecturers and researchers seeking insight into the cutting edge of cloud computing. Software developers, enterprise architects and IT infrastructure managers will also find this work to be both useful and enlightening.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447164524
Subject: Computer science.
Computer communication systems.
Computer security.
Computer science.
Computer Communication Networks.
Systems and Data Security.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Access Control Mechanisms and Cloud Security -- Towards a GPU Cloud -- Taxonomy and Classification of Access Control Models for Cloud Environments -- Access Control as a Service in Cloud -- Part II: Standards, Brokerage Services and Certification -- Realization of Open Cloud Computing Standards, Forums and Platforms -- Role of Broker in InterCloud Environment -- Patterns of Trust -- Part III: Frameworks for ERP, Big Data and Interoperability -- A Framework for Evaluating Cloud Enterprise Resource Planning (ERP) Systems -- DIPAR: A Framework for Implementing Big Data Science in Organizations -- A Framework for Cloud Interoperability Based on Compliance and Conformance -- Part IV: Management, Governance and Capability Assessment -- Survey of Elasticity Management Solutions in Cloud Computing -- From Cloud Management to Cloud Governance -- Towards the Development of a Cloud Service Capability Assessment Framework -- Part V: Applications in Education and Other Scenarios -- Cloud Computing within Higher Education -- Cloud Computing Environment for e-Learning Services for Students with Disabilities -- Application Scenarios Suitable For Deployment in Cloud Environments.
Physical Description: XIX, 410 p. 98 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-6452-4
Publication Date: 2014.


Title: Wireless Sensors in Industrial Time-Critical Environments by José Cecílio, Pedro Furtado.
Computer Communications and Networks,
Computer communications and networks,

Author: Cecílio, José. author.
Furtado, Pedro. author.
SpringerLink (Online service)

General Notes: Introduction -- Industrial Control Systems: Concepts, Components and Architectures -- Distributed Control System Operations -- Industrial Protocols and Planning Considerations -- Scheduling of Wireless Sensor Networks -- Latency Modeling for Distributed Control Systems with Wired and Wireless Sensors -- Planning for Distributed Control Systems with Wired and Wireless Sensors -- Performance and Debugging -- Application Scenario: An Industrial Case Study -- Network Configuration: Example -- Network Layout: Example -- Evaluation of Planning and Monitoring Approaches: Details.
Modern industrial systems are often highly automated, with hundreds or even thousands of sensors and actuators monitoring the various processes, overseen by a distributed control system (DCS). Such control systems increasingly make use of wireless communications, yet these must still satisfy all safety-critical requirements. This unique text introduces the components, operations, industry protocols and standards of DCS, and shows how to include wireless technology in their design while guaranteeing the desired operation characteristics. The book not only discusses the theory, but also presents insights and results gained from extensive practical experience in implementing and testing systems within a specific industrial setting. Topics and features: Reviews the concepts, components and architectures supporting DCS Examines the operations that the DCS implements, covering human-machine interfaces, diagnostics and maintenance interfaces, and controllers Discusses industrial control system and wireless network protocols Reviews scheduling in wireless sensor networks Describes a latency model for heterogeneous DCS with wired and wireless parts, that predicts monitoring latencies, command latencies and closed loop latencies Explains how to plan operation timings systematically Introduces measures and metrics for performance monitoring and debugging, and describes how to add performance monitoring and debugging to a system Presents experimental results to validate the planning approach, based on an application test-bed This practical guide for real-world implementation will be of considerable interest to a wide audience, from professional engineers to researchers and students. It is suitable as a supporting text for courses covering industrial systems, networks, real-time systems, wireless sensor networks or embedded systems.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319028897
Subject: Computer science.
Computer communication systems.
Control engineering.
Computer science.
Computer Communication Networks.
CONTROL.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Industrial Control Systems: Concepts, Components and Architectures -- Distributed Control System Operations -- Industrial Protocols and Planning Considerations -- Scheduling of Wireless Sensor Networks -- Latency Modeling for Distributed Control Systems with Wired and Wireless Sensors -- Planning for Distributed Control Systems with Wired and Wireless Sensors -- Performance and Debugging -- Application Scenario: An Industrial Case Study -- Network Configuration: Example -- Network Layout: Example -- Evaluation of Planning and Monitoring Approaches: Details.
Physical Description: XVII, 135 p. 75 illus., 68 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-02889-7
Publication Date: 2014.


Title: Wireless Sensors in Industrial Time-Critical Environments by José Cecílio, Pedro Furtado.
Computer Communications and Networks,
Computer communications and networks,

Author: Cecílio, José. author.
Furtado, Pedro. author.
SpringerLink (Online service)

General Notes: Introduction -- Industrial Control Systems: Concepts, Components and Architectures -- Distributed Control System Operations -- Industrial Protocols and Planning Considerations -- Scheduling of Wireless Sensor Networks -- Latency Modeling for Distributed Control Systems with Wired and Wireless Sensors -- Planning for Distributed Control Systems with Wired and Wireless Sensors -- Performance and Debugging -- Application Scenario: An Industrial Case Study -- Network Configuration: Example -- Network Layout: Example -- Evaluation of Planning and Monitoring Approaches: Details.
Modern industrial systems are often highly automated, with hundreds or even thousands of sensors and actuators monitoring the various processes, overseen by a distributed control system (DCS). Such control systems increasingly make use of wireless communications, yet these must still satisfy all safety-critical requirements. This unique text introduces the components, operations, industry protocols and standards of DCS, and shows how to include wireless technology in their design while guaranteeing the desired operation characteristics. The book not only discusses the theory, but also presents insights and results gained from extensive practical experience in implementing and testing systems within a specific industrial setting. Topics and features: Reviews the concepts, components and architectures supporting DCS Examines the operations that the DCS implements, covering human-machine interfaces, diagnostics and maintenance interfaces, and controllers Discusses industrial control system and wireless network protocols Reviews scheduling in wireless sensor networks Describes a latency model for heterogeneous DCS with wired and wireless parts, that predicts monitoring latencies, command latencies and closed loop latencies Explains how to plan operation timings systematically Introduces measures and metrics for performance monitoring and debugging, and describes how to add performance monitoring and debugging to a system Presents experimental results to validate the planning approach, based on an application test-bed This practical guide for real-world implementation will be of considerable interest to a wide audience, from professional engineers to researchers and students. It is suitable as a supporting text for courses covering industrial systems, networks, real-time systems, wireless sensor networks or embedded systems.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319028897
Subject: Computer science.
Computer communication systems.
Control engineering.
Computer science.
Computer Communication Networks.
CONTROL.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Industrial Control Systems: Concepts, Components and Architectures -- Distributed Control System Operations -- Industrial Protocols and Planning Considerations -- Scheduling of Wireless Sensor Networks -- Latency Modeling for Distributed Control Systems with Wired and Wireless Sensors -- Planning for Distributed Control Systems with Wired and Wireless Sensors -- Performance and Debugging -- Application Scenario: An Industrial Case Study -- Network Configuration: Example -- Network Layout: Example -- Evaluation of Planning and Monitoring Approaches: Details.
Physical Description: XVII, 135 p. 75 illus., 68 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-02889-7
Publication Date: 2014.


Title: Communication Networks for Smart Grids Making Smart Grid Real / by Kenneth C. Budka, Jayant G. Deshpande, Marina Thottan.
Computer Communications and Networks,
Computer communications and networks,

Author: Budka, Kenneth C. author.
Deshpande, Jayant G. author.
Thottan, Marina. author.
SpringerLink (Online service)

General Notes: Introduction to Smart Grids -- Elements of Power Systems for Networking Practitioners -- Elements of Communication Networking for Power Systems Practitioners -- Conventional Applications in Utility Operations -- Smart Grid Applications -- A Communication Network Architecture for the Smart Grid -- An Overview of Smart Grid Network Design Process -- Network Security -- WAN and FAN Technologies for the Smart Grid -- Smart Grid Data Management -- Communication Network Transformation -- Future of Smart Grid Communication Networks -- Icons Used in Figures -- Smart Grid Characterization -- Fourier Analysis -- Voice over IP and Quality of Service.
A 21st century clean energy economy demands a 21st century electricity grid, yet the communication networks of many utilities today are ill-equipped for smart grid evolution. This must-read text/reference presents an application-centric approach to the development of smart grid communication architecture and network transformation. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response, and synchrophasors as well as more traditional utility applications like SCADA systems. Providing detailed insights derived from the authors’ pivotal research on smart grid communications and extensive consulting experience, the book explains how electric power companies can transform their networks to best meet the challenges of tomorrow’s smart grids. Topics and features: Examines a range of exciting utility applications made possible through smart grid evolution Describes the core-edge network architecture for smart grids, introducing the concept of wide area and field area networks (WANs and FANs) Explains how the network design paradigm for smart grids differs from that for more established data networks, and discusses network security in smart grids Provides an overview of communication network technologies for WANs and FANs, covering OPGW, PLC, and LTE and MPLS technology Investigates secure data-centric data management and data analytics for smart grids Discusses the transformation of a network from conventional modes of utility operation to an integrated network based on the smart grid architecture framework This comprehensive and practical guide will be of great interest to all professionals engaged in the planning, operation, and regulation of smart grids. Students studying courses on smart grids will also find the book to be an invaluable resource.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447163022
Subject: Computer science.
Computer communication systems.
Data encryption (Computer science).
Power electronics.
Computer science.
Computer Communication Networks.
Data encryption.
Power Electronics, Electrical Machines and Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction to Smart Grids -- Elements of Power Systems for Networking Practitioners -- Elements of Communication Networking for Power Systems Practitioners -- Conventional Applications in Utility Operations -- Smart Grid Applications -- A Communication Network Architecture for the Smart Grid -- An Overview of Smart Grid Network Design Process -- Network Security -- WAN and FAN Technologies for the Smart Grid -- Smart Grid Data Management -- Communication Network Transformation -- Future of Smart Grid Communication Networks -- Icons Used in Figures -- Smart Grid Characterization -- Fourier Analysis -- Voice over IP and Quality of Service.
Physical Description: XVIII, 369 p. 119 illus., 32 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-6302-2
Publication Date: 2014.


Title: Communication Networks for Smart Grids Making Smart Grid Real / by Kenneth C. Budka, Jayant G. Deshpande, Marina Thottan.
Computer Communications and Networks,
Computer communications and networks,

Author: Budka, Kenneth C. author.
Deshpande, Jayant G. author.
Thottan, Marina. author.
SpringerLink (Online service)

General Notes: Introduction to Smart Grids -- Elements of Power Systems for Networking Practitioners -- Elements of Communication Networking for Power Systems Practitioners -- Conventional Applications in Utility Operations -- Smart Grid Applications -- A Communication Network Architecture for the Smart Grid -- An Overview of Smart Grid Network Design Process -- Network Security -- WAN and FAN Technologies for the Smart Grid -- Smart Grid Data Management -- Communication Network Transformation -- Future of Smart Grid Communication Networks -- Icons Used in Figures -- Smart Grid Characterization -- Fourier Analysis -- Voice over IP and Quality of Service.
A 21st century clean energy economy demands a 21st century electricity grid, yet the communication networks of many utilities today are ill-equipped for smart grid evolution. This must-read text/reference presents an application-centric approach to the development of smart grid communication architecture and network transformation. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response, and synchrophasors as well as more traditional utility applications like SCADA systems. Providing detailed insights derived from the authors’ pivotal research on smart grid communications and extensive consulting experience, the book explains how electric power companies can transform their networks to best meet the challenges of tomorrow’s smart grids. Topics and features: Examines a range of exciting utility applications made possible through smart grid evolution Describes the core-edge network architecture for smart grids, introducing the concept of wide area and field area networks (WANs and FANs) Explains how the network design paradigm for smart grids differs from that for more established data networks, and discusses network security in smart grids Provides an overview of communication network technologies for WANs and FANs, covering OPGW, PLC, and LTE and MPLS technology Investigates secure data-centric data management and data analytics for smart grids Discusses the transformation of a network from conventional modes of utility operation to an integrated network based on the smart grid architecture framework This comprehensive and practical guide will be of great interest to all professionals engaged in the planning, operation, and regulation of smart grids. Students studying courses on smart grids will also find the book to be an invaluable resource.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447163022
Subject: Computer science.
Computer communication systems.
Data encryption (Computer science).
Power electronics.
Computer science.
Computer Communication Networks.
Data encryption.
Power Electronics, Electrical Machines and Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction to Smart Grids -- Elements of Power Systems for Networking Practitioners -- Elements of Communication Networking for Power Systems Practitioners -- Conventional Applications in Utility Operations -- Smart Grid Applications -- A Communication Network Architecture for the Smart Grid -- An Overview of Smart Grid Network Design Process -- Network Security -- WAN and FAN Technologies for the Smart Grid -- Smart Grid Data Management -- Communication Network Transformation -- Future of Smart Grid Communication Networks -- Icons Used in Figures -- Smart Grid Characterization -- Fourier Analysis -- Voice over IP and Quality of Service.
Physical Description: XVIII, 369 p. 119 illus., 32 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-6302-2
Publication Date: 2014.


Title: Guide to Computer Network Security by Joseph Migga Kizza.
Computer Communications and Networks,
Computer communications and networks,

Author: Kizza, Joseph Migga. author.
SpringerLink (Online service)

General Notes: Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems -- Cloud Computing and Related Security Issues -- Virtualization Security -- Mobile Systems and Corresponding Intractable Security Issues -- Part V: Securing the Last Frontiers – The Home Front -- Conquering the Last Frontier in the Digital Invasion: The Home Front -- Part VI: Hands-on Projects -- Projects.
This important text/reference presents a comprehensive guide to the field of computing and information security and assurance. The book takes a broad view of computer network security, encompassing online social networks, and wireless and mobile systems. This fully updated new edition explores the security issues, vulnerabilities and dangers encountered by the users of modern computing and communication devices, highlighting the need to develop improved algorithms, protocols, and best practices to enhance the security of public, private and enterprise systems alike. Topics and features: ·         Introduces the fundamentals of traditional computer networks, the security threats they face, and the best practices currently in use ·         Discusses the security challenges introduced by virtualization software, cloud computing and mobile systems ·         Examines the security quagmire presented by the home computing environment and the growing number of home hotspots (NEW) ·         Raises important legislative, legal, social, technical and ethical security issues, including the tension between the needs of individual privacy and collective security ·         Provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to lab exercises ·         Supplies additional support material for instructors at an associated website, including laboratory exercises and projects, answers to selected exercises, and course slides This unique work is suitable as both a teaching and a reference tool for all those interested in learning about security in the evolving computing ecosystem. Computer network and data security personnel and policy makers will also find the guide to be a useful and unique source of ideas.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447166542
Subject: Computer science.
Computer communication systems.
Data structures (Computer Science).
Information storage and retrieval.
Management information systems.
Computer science.
Information Storage and Retrieval.
Data Storage Representation.
Management of Computing and Information Systems.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 3rd ed. 2015.
Contents: Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems -- Cloud Computing and Related Security Issues -- Virtualization Security -- Mobile Systems and Corresponding Intractable Security Issues -- Part V: Securing the Last Frontiers – The Home Front -- Conquering the Last Frontier in the Digital Invasion: The Home Front -- Part VI: Hands-on Projects -- Projects.
Physical Description: XXII, 545 p. 108 illus., 58 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-6654-2
Publication Date: 2015.


Title: Guide to Computer Network Security by Joseph Migga Kizza.
Computer Communications and Networks,
Computer communications and networks,

Author: Kizza, Joseph Migga. author.
SpringerLink (Online service)

General Notes: Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems -- Cloud Computing and Related Security Issues -- Virtualization Security -- Mobile Systems and Corresponding Intractable Security Issues -- Part V: Securing the Last Frontiers – The Home Front -- Conquering the Last Frontier in the Digital Invasion: The Home Front -- Part VI: Hands-on Projects -- Projects.
This important text/reference presents a comprehensive guide to the field of computing and information security and assurance. The book takes a broad view of computer network security, encompassing online social networks, and wireless and mobile systems. This fully updated new edition explores the security issues, vulnerabilities and dangers encountered by the users of modern computing and communication devices, highlighting the need to develop improved algorithms, protocols, and best practices to enhance the security of public, private and enterprise systems alike. Topics and features: ·         Introduces the fundamentals of traditional computer networks, the security threats they face, and the best practices currently in use ·         Discusses the security challenges introduced by virtualization software, cloud computing and mobile systems ·         Examines the security quagmire presented by the home computing environment and the growing number of home hotspots (NEW) ·         Raises important legislative, legal, social, technical and ethical security issues, including the tension between the needs of individual privacy and collective security ·         Provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to lab exercises ·         Supplies additional support material for instructors at an associated website, including laboratory exercises and projects, answers to selected exercises, and course slides This unique work is suitable as both a teaching and a reference tool for all those interested in learning about security in the evolving computing ecosystem. Computer network and data security personnel and policy makers will also find the guide to be a useful and unique source of ideas.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447166542
Subject: Computer science.
Computer communication systems.
Data structures (Computer Science).
Information storage and retrieval.
Management information systems.
Computer science.
Information Storage and Retrieval.
Data Storage Representation.
Management of Computing and Information Systems.
Computer Communication Networks.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 3rd ed. 2015.
Contents: Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems -- Cloud Computing and Related Security Issues -- Virtualization Security -- Mobile Systems and Corresponding Intractable Security Issues -- Part V: Securing the Last Frontiers – The Home Front -- Conquering the Last Frontier in the Digital Invasion: The Home Front -- Part VI: Hands-on Projects -- Projects.
Physical Description: XXII, 545 p. 108 illus., 58 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-6654-2
Publication Date: 2015.


Title: Wireless Sensors in Heterogeneous Networked Systems Configuration and Operation Middleware / by José Cecílio, Pedro Furtado.
Computer Communications and Networks,
Computer communications and networks,

Author: Cecílio, José. author.
Furtado, Pedro. author.
SpringerLink (Online service)

General Notes: Introduction -- Wireless Sensor Networks: Concepts and Components -- Application Scenarios -- Existing Middleware Solutions for Wireless Sensor Networks -- Middleware Mechanisms for Heterogeneous Wireless Sensor Networks -- Middleware Implementation Details – A Case Study -- Programming Paradigms and Stream Processing for WSN -- Experimental Validation of Middleware: Platforms, Performance and Related Issues -- Communication Driver – Code Example -- User API.
Sensor networks are increasingly being deployed in a diverse range of applications. Within many of these networks wired sensors, wireless sensors and wired backbone nodes coexist, forming a heterogeneous programmable distributed system. This unique text/reference presents a thorough examination of the middleware that can be used on top of the operating system to configure and operate heterogeneous node platforms and whole sensor networks. The book opens with a review of the application scenarios where networked control systems with wireless sensors may be used, before comparing and analysing the middleware requirements for this set of scenarios. The text then defines middleware architecture for configuration and operation, describing how the proposed mechanisms were integrated in an approach demonstrated live in an oil and gas refinery. The testing and evaluation of this implementation with different hardware and software platforms is also reported. Topics and features: Presents a thorough introduction to the major concepts behind wireless sensor networks Reviews the various application scenarios and existing middleware solutions for wireless sensor networks Discusses the middleware mechanisms necessary for heterogeneous wireless sensor networks Provides a detailed examination of platform-agnostic middleware architecture, including important implementation details for each part of the architecture Investigates the programming paradigms for wireless sensor networks, and for heterogeneous sensor networks in general Describes the results of extensive experimentation and testing, demonstrating that the generic architecture is viable for implementation on multiple platforms Providing helpful insights for students and researchers alike, this book is ideally suitable for use as a reference in both introductory and advanced courses on embedded devices. Practitioners seeking to learn more about how these systems work will also benefit from the in-depth coverage.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319092805
Subject: Computer science.
Computer communication systems.
Architecture, Computer.
Application software.
Electrical engineering.
Computer science.
Computer Communication Networks.
Communications Engineering, Networks.
Computer System Implementation.
COMPUTER APPLICATIONS.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Wireless Sensor Networks: Concepts and Components -- Application Scenarios -- Existing Middleware Solutions for Wireless Sensor Networks -- Middleware Mechanisms for Heterogeneous Wireless Sensor Networks -- Middleware Implementation Details – A Case Study -- Programming Paradigms and Stream Processing for WSN -- Experimental Validation of Middleware: Platforms, Performance and Related Issues -- Communication Driver – Code Example -- User API.
Physical Description: XVIII, 143 p. 66 illus., 15 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-09280-5
Publication Date: 2014.


Title: Wireless Sensors in Heterogeneous Networked Systems Configuration and Operation Middleware / by José Cecílio, Pedro Furtado.
Computer Communications and Networks,
Computer communications and networks,

Author: Cecílio, José. author.
Furtado, Pedro. author.
SpringerLink (Online service)

General Notes: Introduction -- Wireless Sensor Networks: Concepts and Components -- Application Scenarios -- Existing Middleware Solutions for Wireless Sensor Networks -- Middleware Mechanisms for Heterogeneous Wireless Sensor Networks -- Middleware Implementation Details – A Case Study -- Programming Paradigms and Stream Processing for WSN -- Experimental Validation of Middleware: Platforms, Performance and Related Issues -- Communication Driver – Code Example -- User API.
Sensor networks are increasingly being deployed in a diverse range of applications. Within many of these networks wired sensors, wireless sensors and wired backbone nodes coexist, forming a heterogeneous programmable distributed system. This unique text/reference presents a thorough examination of the middleware that can be used on top of the operating system to configure and operate heterogeneous node platforms and whole sensor networks. The book opens with a review of the application scenarios where networked control systems with wireless sensors may be used, before comparing and analysing the middleware requirements for this set of scenarios. The text then defines middleware architecture for configuration and operation, describing how the proposed mechanisms were integrated in an approach demonstrated live in an oil and gas refinery. The testing and evaluation of this implementation with different hardware and software platforms is also reported. Topics and features: Presents a thorough introduction to the major concepts behind wireless sensor networks Reviews the various application scenarios and existing middleware solutions for wireless sensor networks Discusses the middleware mechanisms necessary for heterogeneous wireless sensor networks Provides a detailed examination of platform-agnostic middleware architecture, including important implementation details for each part of the architecture Investigates the programming paradigms for wireless sensor networks, and for heterogeneous sensor networks in general Describes the results of extensive experimentation and testing, demonstrating that the generic architecture is viable for implementation on multiple platforms Providing helpful insights for students and researchers alike, this book is ideally suitable for use as a reference in both introductory and advanced courses on embedded devices. Practitioners seeking to learn more about how these systems work will also benefit from the in-depth coverage.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319092805
Subject: Computer science.
Computer communication systems.
Architecture, Computer.
Application software.
Electrical engineering.
Computer science.
Computer Communication Networks.
Communications Engineering, Networks.
Computer System Implementation.
COMPUTER APPLICATIONS.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction -- Wireless Sensor Networks: Concepts and Components -- Application Scenarios -- Existing Middleware Solutions for Wireless Sensor Networks -- Middleware Mechanisms for Heterogeneous Wireless Sensor Networks -- Middleware Implementation Details – A Case Study -- Programming Paradigms and Stream Processing for WSN -- Experimental Validation of Middleware: Platforms, Performance and Related Issues -- Communication Driver – Code Example -- User API.
Physical Description: XVIII, 143 p. 66 illus., 15 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-09280-5
Publication Date: 2014.


Title: Cloud Computing Challenges, Limitations and R&D Solutions / edited by Zaigham Mahmood.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
SpringerLink (Online service)

General Notes: Part I: Limitations and Challenges of Cloud Environments -- Attacks in Public Clouds -- Distributed Database Management Systems -- Quality of Service and Service Level Agreements for Cloud Environments -- Part II: Current Developments and R&D Solutions -- A Methodology for Cloud Security Risk Management -- SecDSIM -- CloudReports -- Cloud Computing: Efficient Congestion Control in Data Center Networks -- Energy-Aware Virtual Machine Consolidation in IaaS Cloud Computing -- Software-Defined Networking (SDN) for Cloud Applications -- Part III: Advances in Cloud Technologies and Future Trends -- Virtualization and Cloud Security -- Quality-of-Service Data Warehouse for the Selection of Cloud Services -- Characterizing Cloud Federation Approaches -- Security Aspects of Database-as-a-Service (DBaaS) in Cloud Computing -- Beyond the Clouds: How Should Next Generation Utility Computing Infrastructures Be Designed?
This important text/reference reviews the challenging issues that present barriers to greater implementation of the cloud computing paradigm, together with the latest research into developing potential solutions. Exploring the strengths and vulnerabilities of cloud provision and cloud environments, Cloud Computing: Challenges, Limitations and R&D Solutions provides case studies from a diverse selection of researchers and practitioners of international repute. The implications of emerging cloud technologies are also analyzed from the perspective of consumers. Topics and features: Presents a focus on the most important issues and limitations of cloud computing, covering cloud security and architecture, QoS and SLAs Discusses a methodology for cloud security management, and proposes a framework for secure data storage and identity management in the cloud Introduces a simulation tool for energy-aware cloud environments, and an efficient congestion control system for data center networks Examines the issues of energy-aware VM consolidation in the IaaS provision, and software-defined networking for cloud related applications Reviews current trends and suggests future developments in virtualization, cloud security, QoS data warehouses, cloud federation approaches, and DBaaS provision Predicts how the next generation of utility computing infrastructures will be designed The insights provided by this practically-focused collection will be of great benefit to students, lecturers and researchers interested in the state of the art of cloud computing. Software developers, infrastructure managers, and other cloud practitioners will also find the book to be a helpful guide.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319105307
Subject: Computer science.
Computer communication systems.
Computer security.
Database management.
Management information systems.
Computer science.
Computer Communication Networks.
Systems and Data Security.
Management of Computing and Information Systems.
Database management.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Limitations and Challenges of Cloud Environments -- Attacks in Public Clouds -- Distributed Database Management Systems -- Quality of Service and Service Level Agreements for Cloud Environments -- Part II: Current Developments and R&D Solutions -- A Methodology for Cloud Security Risk Management -- SecDSIM -- CloudReports -- Cloud Computing: Efficient Congestion Control in Data Center Networks -- Energy-Aware Virtual Machine Consolidation in IaaS Cloud Computing -- Software-Defined Networking (SDN) for Cloud Applications -- Part III: Advances in Cloud Technologies and Future Trends -- Virtualization and Cloud Security -- Quality-of-Service Data Warehouse for the Selection of Cloud Services -- Characterizing Cloud Federation Approaches -- Security Aspects of Database-as-a-Service (DBaaS) in Cloud Computing -- Beyond the Clouds: How Should Next Generation Utility Computing Infrastructures Be Designed?
Physical Description: XXI, 352 p. 100 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-10530-7
Publication Date: 2014.


Title: Cloud Computing Challenges, Limitations and R&D Solutions / edited by Zaigham Mahmood.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
SpringerLink (Online service)

General Notes: Part I: Limitations and Challenges of Cloud Environments -- Attacks in Public Clouds -- Distributed Database Management Systems -- Quality of Service and Service Level Agreements for Cloud Environments -- Part II: Current Developments and R&D Solutions -- A Methodology for Cloud Security Risk Management -- SecDSIM -- CloudReports -- Cloud Computing: Efficient Congestion Control in Data Center Networks -- Energy-Aware Virtual Machine Consolidation in IaaS Cloud Computing -- Software-Defined Networking (SDN) for Cloud Applications -- Part III: Advances in Cloud Technologies and Future Trends -- Virtualization and Cloud Security -- Quality-of-Service Data Warehouse for the Selection of Cloud Services -- Characterizing Cloud Federation Approaches -- Security Aspects of Database-as-a-Service (DBaaS) in Cloud Computing -- Beyond the Clouds: How Should Next Generation Utility Computing Infrastructures Be Designed?
This important text/reference reviews the challenging issues that present barriers to greater implementation of the cloud computing paradigm, together with the latest research into developing potential solutions. Exploring the strengths and vulnerabilities of cloud provision and cloud environments, Cloud Computing: Challenges, Limitations and R&D Solutions provides case studies from a diverse selection of researchers and practitioners of international repute. The implications of emerging cloud technologies are also analyzed from the perspective of consumers. Topics and features: Presents a focus on the most important issues and limitations of cloud computing, covering cloud security and architecture, QoS and SLAs Discusses a methodology for cloud security management, and proposes a framework for secure data storage and identity management in the cloud Introduces a simulation tool for energy-aware cloud environments, and an efficient congestion control system for data center networks Examines the issues of energy-aware VM consolidation in the IaaS provision, and software-defined networking for cloud related applications Reviews current trends and suggests future developments in virtualization, cloud security, QoS data warehouses, cloud federation approaches, and DBaaS provision Predicts how the next generation of utility computing infrastructures will be designed The insights provided by this practically-focused collection will be of great benefit to students, lecturers and researchers interested in the state of the art of cloud computing. Software developers, infrastructure managers, and other cloud practitioners will also find the book to be a helpful guide.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319105307
Subject: Computer science.
Computer communication systems.
Computer security.
Database management.
Management information systems.
Computer science.
Computer Communication Networks.
Systems and Data Security.
Management of Computing and Information Systems.
Database management.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Limitations and Challenges of Cloud Environments -- Attacks in Public Clouds -- Distributed Database Management Systems -- Quality of Service and Service Level Agreements for Cloud Environments -- Part II: Current Developments and R&D Solutions -- A Methodology for Cloud Security Risk Management -- SecDSIM -- CloudReports -- Cloud Computing: Efficient Congestion Control in Data Center Networks -- Energy-Aware Virtual Machine Consolidation in IaaS Cloud Computing -- Software-Defined Networking (SDN) for Cloud Applications -- Part III: Advances in Cloud Technologies and Future Trends -- Virtualization and Cloud Security -- Quality-of-Service Data Warehouse for the Selection of Cloud Services -- Characterizing Cloud Federation Approaches -- Security Aspects of Database-as-a-Service (DBaaS) in Cloud Computing -- Beyond the Clouds: How Should Next Generation Utility Computing Infrastructures Be Designed?
Physical Description: XXI, 352 p. 100 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-10530-7
Publication Date: 2014.


Title: Privacy in a Digital, Networked World Technologies, Implications and Solutions / edited by Sherali Zeadally, Mohamad Badra.
Computer Communications and Networks,
Computer communications and networks,

Author: Zeadally, Sherali. editor.
Badra, Mohamad. editor.
SpringerLink (Online service)

General Notes: Database Privacy -- Privacy and Big Data -- Privacy in Crowdsourced Platforms -- Privacy in Healthcare -- Privacy in Peer-to-Peer Networks -- Privacy in the Cloud -- Privacy in Vehicular Ad-Hoc Networks -- Privacy Law and Regulation - Technologies, Implications and Solutions -- Privacy in Mobile Devices -- Privacy in Biometric Systems -- Privacy in Social Networks -- The Right to Privacy in the Age of Digital Technology -- How to Explore Consumers’ Privacy Choices with Behavioural Economics -- Techniques, Taxonomy, and Challenges of Privacy Protection in the Smart Grid -- Location-Based Privacy, Protection, Safety, and Security.
This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing such diverse topics as cloud computing, crowdsourcing platforms, vehicular ad-hoc networks, big data, mobile devices, location-based systems, smart grid technology, databases, social networks, healthcare, behavioral economics, and peer-to-peer networks. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Topics and features: Examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks Describes the challenges of addressing privacy concerns in various areas Reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms Investigates approaches for protecting privacy in cloud applications Discusses the regulation of personal information disclosure and the privacy of individuals Presents the tools and the evidence to better understand consumers’ privacy behaviors Offering invaluable support to undergraduate and graduate students, as well as instructors involved in courses on privacy, security and networking, this important work will also be of great interest to researchers and engineers working in the area of privacy. Dr. Sherali Zeadally is an Associate Professor in the College of Communication and Information at the University of Kentucky, Lexington, KY, USA. Dr. Mohamad Badra is an Assistant Professor in the College of Technological Innovation at Zayed University, Dubai, UAE.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319084701
Subject: Computer science.
Computer communication systems.
Data structures (Computer Science).
Information storage and retrieval.
Management information systems.
Computer science.
Computer Communication Networks.
Information Storage and Retrieval.
Data Storage Representation.
Management of Computing and Information Systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 1st ed. 2015.
Contents: Database Privacy -- Privacy and Big Data -- Privacy in Crowdsourced Platforms -- Privacy in Healthcare -- Privacy in Peer-to-Peer Networks -- Privacy in the Cloud -- Privacy in Vehicular Ad-Hoc Networks -- Privacy Law and Regulation - Technologies, Implications and Solutions -- Privacy in Mobile Devices -- Privacy in Biometric Systems -- Privacy in Social Networks -- The Right to Privacy in the Age of Digital Technology -- How to Explore Consumers’ Privacy Choices with Behavioural Economics -- Techniques, Taxonomy, and Challenges of Privacy Protection in the Smart Grid -- Location-Based Privacy, Protection, Safety, and Security.
Physical Description: X, 418 p. 65 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-08470-1
Publication Date: 2015.


Title: Privacy in a Digital, Networked World Technologies, Implications and Solutions / edited by Sherali Zeadally, Mohamad Badra.
Computer Communications and Networks,
Computer communications and networks,

Author: Zeadally, Sherali. editor.
Badra, Mohamad. editor.
SpringerLink (Online service)

General Notes: Database Privacy -- Privacy and Big Data -- Privacy in Crowdsourced Platforms -- Privacy in Healthcare -- Privacy in Peer-to-Peer Networks -- Privacy in the Cloud -- Privacy in Vehicular Ad-Hoc Networks -- Privacy Law and Regulation - Technologies, Implications and Solutions -- Privacy in Mobile Devices -- Privacy in Biometric Systems -- Privacy in Social Networks -- The Right to Privacy in the Age of Digital Technology -- How to Explore Consumers’ Privacy Choices with Behavioural Economics -- Techniques, Taxonomy, and Challenges of Privacy Protection in the Smart Grid -- Location-Based Privacy, Protection, Safety, and Security.
This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing such diverse topics as cloud computing, crowdsourcing platforms, vehicular ad-hoc networks, big data, mobile devices, location-based systems, smart grid technology, databases, social networks, healthcare, behavioral economics, and peer-to-peer networks. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Topics and features: Examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks Describes the challenges of addressing privacy concerns in various areas Reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms Investigates approaches for protecting privacy in cloud applications Discusses the regulation of personal information disclosure and the privacy of individuals Presents the tools and the evidence to better understand consumers’ privacy behaviors Offering invaluable support to undergraduate and graduate students, as well as instructors involved in courses on privacy, security and networking, this important work will also be of great interest to researchers and engineers working in the area of privacy. Dr. Sherali Zeadally is an Associate Professor in the College of Communication and Information at the University of Kentucky, Lexington, KY, USA. Dr. Mohamad Badra is an Assistant Professor in the College of Technological Innovation at Zayed University, Dubai, UAE.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319084701
Subject: Computer science.
Computer communication systems.
Data structures (Computer Science).
Information storage and retrieval.
Management information systems.
Computer science.
Computer Communication Networks.
Information Storage and Retrieval.
Data Storage Representation.
Management of Computing and Information Systems.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 1st ed. 2015.
Contents: Database Privacy -- Privacy and Big Data -- Privacy in Crowdsourced Platforms -- Privacy in Healthcare -- Privacy in Peer-to-Peer Networks -- Privacy in the Cloud -- Privacy in Vehicular Ad-Hoc Networks -- Privacy Law and Regulation - Technologies, Implications and Solutions -- Privacy in Mobile Devices -- Privacy in Biometric Systems -- Privacy in Social Networks -- The Right to Privacy in the Age of Digital Technology -- How to Explore Consumers’ Privacy Choices with Behavioural Economics -- Techniques, Taxonomy, and Challenges of Privacy Protection in the Smart Grid -- Location-Based Privacy, Protection, Safety, and Security.
Physical Description: X, 418 p. 65 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-08470-1
Publication Date: 2015.


Title: Guide to High Performance Distributed Computing Case Studies with Hadoop, Scalding and Spark / by K.G. Srinivasa, Anil Kumar Muppalla.
Computer Communications and Networks,
Computer communications and networks,

Author: Srinivasa, K.G. author.
Muppalla, Anil Kumar. author.
SpringerLink (Online service)

General Notes: Part I: Programming Fundamentals of High Performance Distributed Computing -- Introduction -- Getting Started with Hadoop -- Getting Started with Spark -- Programming Internals of Scalding and Spark -- Part II: Case studies using Hadoop, Scalding and Spark -- Case Study I: Data Clustering using Scalding and Spark -- Case Study II: Data Classification using Scalding and Spark -- Case Study III: Regression Analysis using Scalding and Spark -- Case Study IV: Recommender System using Scalding and Spark.
This timely text/reference describes the development and implementation of large-scale distributed processing systems using open source tools and technologies such as Hadoop, Scalding and Spark. Comprehensive in scope, the book presents state-of-the-art material on building high performance distributed computing systems, providing practical guidance and best practices as well as describing theoretical software frameworks. Topics and features: Describes the fundamentals of building scalable software systems for large-scale data processing in the new paradigm of high performance distributed computing Presents an overview of the Hadoop ecosystem, followed by step-by-step instruction on its installation, programming and execution Reviews the basics of Spark, including resilient distributed datasets, and examines Hadoop streaming and working with Scalding Provides detailed case studies on approaches to clustering, data classification and regression analysis Explains the process of creating a working recommender system using Scalding and Spark Supplies a complete list of supplementary source code and datasets at an associated website Fulfilling the need for both introductory material for undergraduate students of computer science and detailed discussions for software engineering professionals, this book will aid a broad audience to understand the esoteric aspects of practical high performance computing through its use of solved problems, research case studies and working source code. K.G. Srinivasa is Professor and Head of the Department of Computer Science and Engineering at M.S. Ramaiah Institute of Technology (MSRIT), Bangalore, India. His other publications include the Springer title Soft Computing for Data Mining Applications. Anil Kumar Muppalla is also a researcher at MSRIT.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319134970
Subject: Computer science.
Computer communication systems.
Computer programming.
Data mining.
Artificial intelligence.
Image processing.
Computer science.
Computer Communication Networks.
Programming Techniques.
Data Mining and Knowledge Discovery.
Artificial Intelligence (incl. Robotics).
Image Processing and Computer Vision.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Programming Fundamentals of High Performance Distributed Computing -- Introduction -- Getting Started with Hadoop -- Getting Started with Spark -- Programming Internals of Scalding and Spark -- Part II: Case studies using Hadoop, Scalding and Spark -- Case Study I: Data Clustering using Scalding and Spark -- Case Study II: Data Classification using Scalding and Spark -- Case Study III: Regression Analysis using Scalding and Spark -- Case Study IV: Recommender System using Scalding and Spark.
Physical Description: XVII, 304 p. 43 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-13497-0
Publication Date: 2015.


Title: Guide to High Performance Distributed Computing Case Studies with Hadoop, Scalding and Spark / by K.G. Srinivasa, Anil Kumar Muppalla.
Computer Communications and Networks,
Computer communications and networks,

Author: Srinivasa, K.G. author.
Muppalla, Anil Kumar. author.
SpringerLink (Online service)

General Notes: Part I: Programming Fundamentals of High Performance Distributed Computing -- Introduction -- Getting Started with Hadoop -- Getting Started with Spark -- Programming Internals of Scalding and Spark -- Part II: Case studies using Hadoop, Scalding and Spark -- Case Study I: Data Clustering using Scalding and Spark -- Case Study II: Data Classification using Scalding and Spark -- Case Study III: Regression Analysis using Scalding and Spark -- Case Study IV: Recommender System using Scalding and Spark.
This timely text/reference describes the development and implementation of large-scale distributed processing systems using open source tools and technologies such as Hadoop, Scalding and Spark. Comprehensive in scope, the book presents state-of-the-art material on building high performance distributed computing systems, providing practical guidance and best practices as well as describing theoretical software frameworks. Topics and features: Describes the fundamentals of building scalable software systems for large-scale data processing in the new paradigm of high performance distributed computing Presents an overview of the Hadoop ecosystem, followed by step-by-step instruction on its installation, programming and execution Reviews the basics of Spark, including resilient distributed datasets, and examines Hadoop streaming and working with Scalding Provides detailed case studies on approaches to clustering, data classification and regression analysis Explains the process of creating a working recommender system using Scalding and Spark Supplies a complete list of supplementary source code and datasets at an associated website Fulfilling the need for both introductory material for undergraduate students of computer science and detailed discussions for software engineering professionals, this book will aid a broad audience to understand the esoteric aspects of practical high performance computing through its use of solved problems, research case studies and working source code. K.G. Srinivasa is Professor and Head of the Department of Computer Science and Engineering at M.S. Ramaiah Institute of Technology (MSRIT), Bangalore, India. His other publications include the Springer title Soft Computing for Data Mining Applications. Anil Kumar Muppalla is also a researcher at MSRIT.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319134970
Subject: Computer science.
Computer communication systems.
Computer programming.
Data mining.
Artificial intelligence.
Image processing.
Computer science.
Computer Communication Networks.
Programming Techniques.
Data Mining and Knowledge Discovery.
Artificial Intelligence (incl. Robotics).
Image Processing and Computer Vision.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Programming Fundamentals of High Performance Distributed Computing -- Introduction -- Getting Started with Hadoop -- Getting Started with Spark -- Programming Internals of Scalding and Spark -- Part II: Case studies using Hadoop, Scalding and Spark -- Case Study I: Data Clustering using Scalding and Spark -- Case Study II: Data Classification using Scalding and Spark -- Case Study III: Regression Analysis using Scalding and Spark -- Case Study IV: Recommender System using Scalding and Spark.
Physical Description: XVII, 304 p. 43 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-13497-0
Publication Date: 2015.


Title: Guide to DataFlow Supercomputing Basic Concepts, Case Studies, and a Detailed Example / by Veljko Milutinović, Jakob Salom, Nemanja Trifunovic, Roberto Giorgi.
Computer Communications and Networks,
Computer communications and networks,

Author: Milutinović, Veljko. author.
Salom, Jakob. author.
Trifunovic, Nemanja. author.
Giorgi, Roberto. author.
SpringerLink (Online service)

General Notes: The DataFlow Paradigm -- Selected Case Studies -- An Example Application: Fourier Transform -- Using the WebIDE.
This unique text/reference describes an exciting and novel approach to supercomputing in the DataFlow paradigm. The major advantages and applications of this approach are clearly described, and a detailed explanation of the programming model is provided using simple yet effective examples. The work is developed from a series of lecture courses taught by the authors in more than 40 universities across more than 20 countries, and from research carried out by Maxeler Technologies, Inc.  Topics and features: Presents a thorough introduction to DataFlow supercomputing for big data problems Reviews the latest research on the DataFlow architecture and its applications Introduces a new method for the rapid handling of real-world challenges involving large datasets Provides a case study on the use of the new approach to accelerate the Cooley-Tukey algorithm on a DataFlow machine Includes a step-by-step guide to the web-based integrated development environment WebIDE Draws from the authors’ extensive experience in both academic teaching and industrial research Students, lecturers, and researchers in industry will find this concise book to be an ideal supplementary text for courses and seminars on VLSI, multi-core systems, and DataFlow computing. Dr. Veljko Milutinović is a Professor in the Department of Computer Engineering at the University of Belgrade, Serbia. His publications include the Springer title Application and Multidisciplinary Aspects of Wireless Sensor Networks. Dr. Jakob Salom is a member of the Mathematical Institute of the Serbian Academy of Sciences and Arts. Nemanja Trifunovic is a Project Manager at Maxeler Technologies, Palo Alto, CA, USA. Dr. Roberto Giorgi is an Associate Professor of Computer Engineering at the University of Siena, Italy.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319162294
Subject: Computer science.
Input-output equipment (Computers).
Architecture, Computer.
Software engineering.
Data mining.
Computer science.
Input/Output and Data Communications.
Data Mining and Knowledge Discovery.
Software engineering.
Computer System Implementation.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: The DataFlow Paradigm -- Selected Case Studies -- An Example Application: Fourier Transform -- Using the WebIDE.
Physical Description: IX, 129 p. 94 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-16229-4
Publication Date: 2015.


Title: Guide to DataFlow Supercomputing Basic Concepts, Case Studies, and a Detailed Example / by Veljko Milutinović, Jakob Salom, Nemanja Trifunovic, Roberto Giorgi.
Computer Communications and Networks,
Computer communications and networks,

Author: Milutinović, Veljko. author.
Salom, Jakob. author.
Trifunovic, Nemanja. author.
Giorgi, Roberto. author.
SpringerLink (Online service)

General Notes: The DataFlow Paradigm -- Selected Case Studies -- An Example Application: Fourier Transform -- Using the WebIDE.
This unique text/reference describes an exciting and novel approach to supercomputing in the DataFlow paradigm. The major advantages and applications of this approach are clearly described, and a detailed explanation of the programming model is provided using simple yet effective examples. The work is developed from a series of lecture courses taught by the authors in more than 40 universities across more than 20 countries, and from research carried out by Maxeler Technologies, Inc.  Topics and features: Presents a thorough introduction to DataFlow supercomputing for big data problems Reviews the latest research on the DataFlow architecture and its applications Introduces a new method for the rapid handling of real-world challenges involving large datasets Provides a case study on the use of the new approach to accelerate the Cooley-Tukey algorithm on a DataFlow machine Includes a step-by-step guide to the web-based integrated development environment WebIDE Draws from the authors’ extensive experience in both academic teaching and industrial research Students, lecturers, and researchers in industry will find this concise book to be an ideal supplementary text for courses and seminars on VLSI, multi-core systems, and DataFlow computing. Dr. Veljko Milutinović is a Professor in the Department of Computer Engineering at the University of Belgrade, Serbia. His publications include the Springer title Application and Multidisciplinary Aspects of Wireless Sensor Networks. Dr. Jakob Salom is a member of the Mathematical Institute of the Serbian Academy of Sciences and Arts. Nemanja Trifunovic is a Project Manager at Maxeler Technologies, Palo Alto, CA, USA. Dr. Roberto Giorgi is an Associate Professor of Computer Engineering at the University of Siena, Italy.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319162294
Subject: Computer science.
Input-output equipment (Computers).
Architecture, Computer.
Software engineering.
Data mining.
Computer science.
Input/Output and Data Communications.
Data Mining and Knowledge Discovery.
Software engineering.
Computer System Implementation.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: The DataFlow Paradigm -- Selected Case Studies -- An Example Application: Fourier Transform -- Using the WebIDE.
Physical Description: IX, 129 p. 94 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-16229-4
Publication Date: 2015.


Title: Guide to Flow-Aware Networking Quality-of-Service Architectures and Techniques for Traffic Management / by Jerzy Domżał, Robert Wójcik, Andrzej Jajszczyk.
Computer Communications and Networks,
Computer communications and networks,

Author: Domżał, Jerzy. author.
Wójcik, Robert. author.
Jajszczyk, Andrzej. author.
SpringerLink (Online service)

General Notes: This clearly-written text/reference provides a practical guide to flow-aware networking (FAN), one of the most promising new quality-of-service architectures for the Future Internet. The latest concepts are examined in detail, including coverage of approximate flow-aware networking. The scope and evolution of the debate on network neutrality is also discussed. Topics and features: Provides a broad survey of flow-oriented approaches and solutions based on the concept of flows Presents a range of mechanisms for improving transmission performance of streaming flows under congestion Illustrates how problems caused by congestion may be solved in a multilayer environment, proposing new methods for enhancing transmission in wired-wireless FAN Analyzes aspects of fair transmission in FAN, reviewing algorithms that improve transmission of streaming flows during network failures, and investigating the capabilities of FAN in relation to service differentiation Describes the implementation aspects of the cross-protect router, presenting the implementation suite and the first tests results of the developed prototype Concludes each chapter with review questions, with answers provided at the end of the book Offering valuable information for anyone wanting to better understand the basic principles underlying modern networking technology, the Guide to Flow-Aware Networking is essential reading for network engineers and operators interested in the development of the Internet. The work is also eminently suitable as a supplementary textbook for graduate students of computer science and electrical engineering involved in data communications and networking.
Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319249759
Subject: Computer science.
Computer communication systems.
Computer science.
Computer Communication Networks.
Information Systems Applications (incl.Internet).

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 1st ed. 2015.
Physical Description: XVII, 236 p. 124 illus., 26 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-24975-9
Publication Date: 2015.


Title: Guide to Flow-Aware Networking Quality-of-Service Architectures and Techniques for Traffic Management / by Jerzy Domżał, Robert Wójcik, Andrzej Jajszczyk.
Computer Communications and Networks,
Computer communications and networks,

Author: Domżał, Jerzy. author.
Wójcik, Robert. author.
Jajszczyk, Andrzej. author.
SpringerLink (Online service)

General Notes: This clearly-written text/reference provides a practical guide to flow-aware networking (FAN), one of the most promising new quality-of-service architectures for the Future Internet. The latest concepts are examined in detail, including coverage of approximate flow-aware networking. The scope and evolution of the debate on network neutrality is also discussed. Topics and features: Provides a broad survey of flow-oriented approaches and solutions based on the concept of flows Presents a range of mechanisms for improving transmission performance of streaming flows under congestion Illustrates how problems caused by congestion may be solved in a multilayer environment, proposing new methods for enhancing transmission in wired-wireless FAN Analyzes aspects of fair transmission in FAN, reviewing algorithms that improve transmission of streaming flows during network failures, and investigating the capabilities of FAN in relation to service differentiation Describes the implementation aspects of the cross-protect router, presenting the implementation suite and the first tests results of the developed prototype Concludes each chapter with review questions, with answers provided at the end of the book Offering valuable information for anyone wanting to better understand the basic principles underlying modern networking technology, the Guide to Flow-Aware Networking is essential reading for network engineers and operators interested in the development of the Internet. The work is also eminently suitable as a supplementary textbook for graduate students of computer science and electrical engineering involved in data communications and networking.
Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319249759
Subject: Computer science.
Computer communication systems.
Computer science.
Computer Communication Networks.
Information Systems Applications (incl.Internet).

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 1st ed. 2015.
Physical Description: XVII, 236 p. 124 illus., 26 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-24975-9
Publication Date: 2015.


Title: High-Performance Big-Data Analytics Computing Systems and Approaches / by Pethuru Raj, Anupama Raman, Dhivya Nagaraj, Siddhartha Duggirala.
Computer Communications and Networks,
Computer communications and networks,

Author: Raj, Pethuru. author.
Raman, Anupama. author.
Nagaraj, Dhivya. author.
Duggirala, Siddhartha. author.
SpringerLink (Online service)

General Notes: Emerging Trends and Transformations in the IT Landscape -- High Performance Technologies for Big- and Fast-Data Analytics -- Big- and Fast-Data Analytics for High-Performance Computing -- Network Infrastructure for High-Performance Big-Data Analytics -- Storage Infrastructure for High-Performance Big-Data Analytics -- Real-Time Analytics using High-Performance Computing -- High-Performance Computing Paradigms -- In-Database Processing and In-Memory Analytics -- High-Performance Integrated Systems, Databases and Warehouses for Big- and Fast-Data Analytics -- Cluster and Grid Computing Paradigms -- High-Performance Peer-to-Peer Systems -- Visualization Dimensions for High-Performance Big-Data Analytics -- Social Media Analytics for Organization Empowerment -- Big-Data Analytics for Healthcare.
This important and timely text/reference presents a detailed review of high-performance computing infrastructures for next-generation big data and fast data analytics.  Comprehensively covering a diverse range of computer systems and proven techniques for high-performance big-data analytics, the book also presents case studies, practical guidelines, and best practices for enabling decision-making toward implementing the appropriate computer systems and approaches. Topics and features: Includes case studies and learning activities throughout the book, and self-study exercises at the end of every chapter Presents detailed case studies on social media analytics for intelligent businesses, and on big data analytics in the healthcare sector Describes the network infrastructure requirements for effective transfer of big data, and the storage infrastructure requirements of applications which generate big data Examines real-time analytics solutions, such as machine data analytics and operational analytics Introduces in-database processing and in-memory analytics techniques for data mining Discusses the use of mainframes for handling real-time big data, and the latest types of data management systems for big and fast data analytics Provides information on the use of cluster, grid and cloud computing systems for big data analytics and data-intensive processing Reviews the peer-to-peer techniques and tools, and the common information visualization techniques, used in big data analytics Software engineers, cloud professionals and big data scientists will find this book to be an informative and inspiring read, highlighting the indispensable role data analytics will play in shaping a smart future.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319207445
Subject: Computer science.
Microprocessors.
Computer communication systems.
Application software.
Computer science.
Computer Communication Networks.
Information Systems Applications (incl.Internet).
Computer Appl. in Administrative Data Processing.
Processor Architectures.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 1st ed. 2015.
Contents: Emerging Trends and Transformations in the IT Landscape -- High Performance Technologies for Big- and Fast-Data Analytics -- Big- and Fast-Data Analytics for High-Performance Computing -- Network Infrastructure for High-Performance Big-Data Analytics -- Storage Infrastructure for High-Performance Big-Data Analytics -- Real-Time Analytics using High-Performance Computing -- High-Performance Computing Paradigms -- In-Database Processing and In-Memory Analytics -- High-Performance Integrated Systems, Databases and Warehouses for Big- and Fast-Data Analytics -- Cluster and Grid Computing Paradigms -- High-Performance Peer-to-Peer Systems -- Visualization Dimensions for High-Performance Big-Data Analytics -- Social Media Analytics for Organization Empowerment -- Big-Data Analytics for Healthcare.
Physical Description: XXII, 428 p. 164 illus., 149 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-20744-5
Publication Date: 2015.


Title: High-Performance Big-Data Analytics Computing Systems and Approaches / by Pethuru Raj, Anupama Raman, Dhivya Nagaraj, Siddhartha Duggirala.
Computer Communications and Networks,
Computer communications and networks,

Author: Raj, Pethuru. author.
Raman, Anupama. author.
Nagaraj, Dhivya. author.
Duggirala, Siddhartha. author.
SpringerLink (Online service)

General Notes: Emerging Trends and Transformations in the IT Landscape -- High Performance Technologies for Big- and Fast-Data Analytics -- Big- and Fast-Data Analytics for High-Performance Computing -- Network Infrastructure for High-Performance Big-Data Analytics -- Storage Infrastructure for High-Performance Big-Data Analytics -- Real-Time Analytics using High-Performance Computing -- High-Performance Computing Paradigms -- In-Database Processing and In-Memory Analytics -- High-Performance Integrated Systems, Databases and Warehouses for Big- and Fast-Data Analytics -- Cluster and Grid Computing Paradigms -- High-Performance Peer-to-Peer Systems -- Visualization Dimensions for High-Performance Big-Data Analytics -- Social Media Analytics for Organization Empowerment -- Big-Data Analytics for Healthcare.
This important and timely text/reference presents a detailed review of high-performance computing infrastructures for next-generation big data and fast data analytics.  Comprehensively covering a diverse range of computer systems and proven techniques for high-performance big-data analytics, the book also presents case studies, practical guidelines, and best practices for enabling decision-making toward implementing the appropriate computer systems and approaches. Topics and features: Includes case studies and learning activities throughout the book, and self-study exercises at the end of every chapter Presents detailed case studies on social media analytics for intelligent businesses, and on big data analytics in the healthcare sector Describes the network infrastructure requirements for effective transfer of big data, and the storage infrastructure requirements of applications which generate big data Examines real-time analytics solutions, such as machine data analytics and operational analytics Introduces in-database processing and in-memory analytics techniques for data mining Discusses the use of mainframes for handling real-time big data, and the latest types of data management systems for big and fast data analytics Provides information on the use of cluster, grid and cloud computing systems for big data analytics and data-intensive processing Reviews the peer-to-peer techniques and tools, and the common information visualization techniques, used in big data analytics Software engineers, cloud professionals and big data scientists will find this book to be an informative and inspiring read, highlighting the indispensable role data analytics will play in shaping a smart future.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319207445
Subject: Computer science.
Microprocessors.
Computer communication systems.
Application software.
Computer science.
Computer Communication Networks.
Information Systems Applications (incl.Internet).
Computer Appl. in Administrative Data Processing.
Processor Architectures.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 1st ed. 2015.
Contents: Emerging Trends and Transformations in the IT Landscape -- High Performance Technologies for Big- and Fast-Data Analytics -- Big- and Fast-Data Analytics for High-Performance Computing -- Network Infrastructure for High-Performance Big-Data Analytics -- Storage Infrastructure for High-Performance Big-Data Analytics -- Real-Time Analytics using High-Performance Computing -- High-Performance Computing Paradigms -- In-Database Processing and In-Memory Analytics -- High-Performance Integrated Systems, Databases and Warehouses for Big- and Fast-Data Analytics -- Cluster and Grid Computing Paradigms -- High-Performance Peer-to-Peer Systems -- Visualization Dimensions for High-Performance Big-Data Analytics -- Social Media Analytics for Organization Empowerment -- Big-Data Analytics for Healthcare.
Physical Description: XXII, 428 p. 164 illus., 149 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-20744-5
Publication Date: 2015.


Title: Fault-Tolerance Techniques for High-Performance Computing edited by Thomas Herault, Yves Robert.
Computer Communications and Networks,
Computer communications and networks,

Author: Herault, Thomas. editor.
Robert, Yves. editor.
SpringerLink (Online service)

General Notes: Part I: General Overview -- Fault-Tolerance Techniques for High-Performance Computing -- Part II: Technical Contributions -- Errors and Faults -- Fault-Tolerant MPI -- Using Replication for Resilience on Exascale Systems -- Energy-Aware Check pointing Strategies.
This timely text/reference presents a comprehensive overview of fault tolerance techniques for high-performance computing (HPC). The text opens with a detailed introduction to the concepts of checkpoint protocols and scheduling algorithms, prediction, replication, silent error detection and correction, together with some application-specific techniques such as algorithm-based fault tolerance. Emphasis is placed on analytical performance models. This is then followed by a review of general-purpose techniques, including several checkpoint and rollback recovery protocols. Relevant execution scenarios are also evaluated and compared through quantitative models. Topics and features: Includes self-contained contributions from an international selection of preeminent experts Provides a survey of resilience methods and performance models Examines the various sources for errors and faults in large-scale systems, detailing their characteristics, with a focus on modeling, detection and prediction Reviews the spectrum of techniques that can be applied to design a fault-tolerant message passing interface Investigates different approaches to replication, comparing these to the traditional checkpoint-recovery approach Discusses the challenge of energy consumption of fault-tolerance methods in extreme-scale systems, proposing a methodology to estimate such energy consumption This authoritative volume is essential reading for all researchers and graduate students involved in high-performance computing. Dr. Thomas Herault is a Research Scientist in the Innovative Computing Laboratory (ICL) at the University of Tennessee Knoxville, TN, USA. Dr. Yves Robert is a Professor in the Laboratory of Parallel Computing at the Ecole Normale Supérieure de Lyon, France, and a Visiting Research Scholar in the ICL.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319209432
Subject: Computer science.
Computer software -- Reusability.
Computer system failures.
Numerical analysis.
Computer science.
System Performance and Evaluation.
Performance and Reliability.
Numeric Computing.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: General Overview -- Fault-Tolerance Techniques for High-Performance Computing -- Part II: Technical Contributions -- Errors and Faults -- Fault-Tolerant MPI -- Using Replication for Resilience on Exascale Systems -- Energy-Aware Check pointing Strategies.
Physical Description: IX, 320 p. 113 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-20943-2
Publication Date: 2015.


Title: Fault-Tolerance Techniques for High-Performance Computing edited by Thomas Herault, Yves Robert.
Computer Communications and Networks,
Computer communications and networks,

Author: Herault, Thomas. editor.
Robert, Yves. editor.
SpringerLink (Online service)

General Notes: Part I: General Overview -- Fault-Tolerance Techniques for High-Performance Computing -- Part II: Technical Contributions -- Errors and Faults -- Fault-Tolerant MPI -- Using Replication for Resilience on Exascale Systems -- Energy-Aware Check pointing Strategies.
This timely text/reference presents a comprehensive overview of fault tolerance techniques for high-performance computing (HPC). The text opens with a detailed introduction to the concepts of checkpoint protocols and scheduling algorithms, prediction, replication, silent error detection and correction, together with some application-specific techniques such as algorithm-based fault tolerance. Emphasis is placed on analytical performance models. This is then followed by a review of general-purpose techniques, including several checkpoint and rollback recovery protocols. Relevant execution scenarios are also evaluated and compared through quantitative models. Topics and features: Includes self-contained contributions from an international selection of preeminent experts Provides a survey of resilience methods and performance models Examines the various sources for errors and faults in large-scale systems, detailing their characteristics, with a focus on modeling, detection and prediction Reviews the spectrum of techniques that can be applied to design a fault-tolerant message passing interface Investigates different approaches to replication, comparing these to the traditional checkpoint-recovery approach Discusses the challenge of energy consumption of fault-tolerance methods in extreme-scale systems, proposing a methodology to estimate such energy consumption This authoritative volume is essential reading for all researchers and graduate students involved in high-performance computing. Dr. Thomas Herault is a Research Scientist in the Innovative Computing Laboratory (ICL) at the University of Tennessee Knoxville, TN, USA. Dr. Yves Robert is a Professor in the Laboratory of Parallel Computing at the Ecole Normale Supérieure de Lyon, France, and a Visiting Research Scholar in the ICL.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319209432
Subject: Computer science.
Computer software -- Reusability.
Computer system failures.
Numerical analysis.
Computer science.
System Performance and Evaluation.
Performance and Reliability.
Numeric Computing.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: General Overview -- Fault-Tolerance Techniques for High-Performance Computing -- Part II: Technical Contributions -- Errors and Faults -- Fault-Tolerant MPI -- Using Replication for Resilience on Exascale Systems -- Energy-Aware Check pointing Strategies.
Physical Description: IX, 320 p. 113 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-20943-2
Publication Date: 2015.


Title: Resilient Routing in Communication Networks by Jacek Rak.
Computer Communications and Networks,
Computer communications and networks,

Author: Rak, Jacek. author.
SpringerLink (Online service)

General Notes: Introduction -- Principles of Communication Networks Resilience -- Resilience of Future Internet Communications -- Resilience of Wireless Mesh Networks -- Disruption-tolerant Routing in Vehicular Ad-hoc Networks.
This important text/reference addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). For each of these network architectures, a selection of novel approaches are described, followed by evaluation of their characteristics. Topics and features: Discusses FI architecture for network virtualization, examining the network resource provisioning necessary to provide network resilience Introduces proposals for dedicated and shared protection in random failure scenarios and against malicious activities Describes measures for WMN survivability that allow for evaluation of performance under multiple failures Proposes a new scheme to enable proactive updates of WMN antenna alignment to prepare the network in advance for changing weather conditions Includes a detailed analysis of the differentiated reliability requirements for VANET applications, with a focus on issues of multi‑hop data delivery Reviews techniques for improving the stability of end-to-end VANET communication paths based on multipath routing and anycast forwarding Researchers and practitioners interested in contemporary and future communication network architectures, from both academia and industry, will find this to be a must-read work on issues of end-to-end resilient routing. Dr. Jacek Rak is an Assistant Professor in the Department of Computer Communications at the Faculty of Electronics, Telecommunications, and Informatics of Gdansk University of Technology, Poland.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319223339
Subject: Computer science.
Computer software -- Reusability.
Computer communication systems.
Computer simulation.
Computer science.
Computer Communication Networks.
Performance and Reliability.
Simulation and Modeling.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 1st ed. 2015.
Contents: Introduction -- Principles of Communication Networks Resilience -- Resilience of Future Internet Communications -- Resilience of Wireless Mesh Networks -- Disruption-tolerant Routing in Vehicular Ad-hoc Networks.
Physical Description: XVII, 181 p. 71 illus., 4 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-22333-9
Publication Date: 2015.


Title: Resilient Routing in Communication Networks by Jacek Rak.
Computer Communications and Networks,
Computer communications and networks,

Author: Rak, Jacek. author.
SpringerLink (Online service)

General Notes: Introduction -- Principles of Communication Networks Resilience -- Resilience of Future Internet Communications -- Resilience of Wireless Mesh Networks -- Disruption-tolerant Routing in Vehicular Ad-hoc Networks.
This important text/reference addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). For each of these network architectures, a selection of novel approaches are described, followed by evaluation of their characteristics. Topics and features: Discusses FI architecture for network virtualization, examining the network resource provisioning necessary to provide network resilience Introduces proposals for dedicated and shared protection in random failure scenarios and against malicious activities Describes measures for WMN survivability that allow for evaluation of performance under multiple failures Proposes a new scheme to enable proactive updates of WMN antenna alignment to prepare the network in advance for changing weather conditions Includes a detailed analysis of the differentiated reliability requirements for VANET applications, with a focus on issues of multi‑hop data delivery Reviews techniques for improving the stability of end-to-end VANET communication paths based on multipath routing and anycast forwarding Researchers and practitioners interested in contemporary and future communication network architectures, from both academia and industry, will find this to be a must-read work on issues of end-to-end resilient routing. Dr. Jacek Rak is an Assistant Professor in the Department of Computer Communications at the Faculty of Electronics, Telecommunications, and Informatics of Gdansk University of Technology, Poland.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319223339
Subject: Computer science.
Computer software -- Reusability.
Computer communication systems.
Computer simulation.
Computer science.
Computer Communication Networks.
Performance and Reliability.
Simulation and Modeling.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 1st ed. 2015.
Contents: Introduction -- Principles of Communication Networks Resilience -- Resilience of Future Internet Communications -- Resilience of Wireless Mesh Networks -- Disruption-tolerant Routing in Vehicular Ad-hoc Networks.
Physical Description: XVII, 181 p. 71 illus., 4 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-22333-9
Publication Date: 2015.


Title: Guide to security assurance for cloud computing / Shao Ying Zhu, Richard Hill, Marcello Trovati, editors.
Computer communications and networks
Computer communications and networks.

Author: Zhu, Shao Ying, editor.
Hill, Richard, editor.
Trovati, Marcello, editor.

General Notes: Includes index., Includes index.
Publisher: Springer,
Publication Place: Cham New York
ISBN: 3319259865
9783319259864

Subject: Cloud computing -- Security measures.
Series: Computer communications and networks
Computer communications and networks.

Contents: Machine generated contents note: pt. I Key Concepts -- 1.Privacy, Compliance and the Cloud / Chris Mitchell -- 2.Cryptographic Tools for Cloud Environments / Keith M. Martin -- 3.Migrating to Public Clouds -- From a Security Perspective / Lu Liu -- 4.Virtualization Security in Cloud Computing / Shao Ying Zhu -- 5.Security of Cloud-Based Storage / Gaurav Somani -- 6.Cloud Computing Governance, Risk, and Compliance -- The Quintessential Globalization Challenge / Rhonda L. Farrell -- 7.Cloud Computing and Security in the Future / Kenneth Johnston -- pt. II Application and Approaches -- 8.Security Certification for the Cloud: The CUMULUS Approach / Hristo Koshutanski -- 9.Improving Cloud Assurance and Transparency Through Accountability Mechanisms / Christoph Reich -- 10.DDoS Protection and Security Assurance in Cloud / Dheeraj Sanghi -- 11.Cloud Data Auditing Using Proofs of Retrievability / Sushmita Ruj -- 12.Vehicular Cloud Networks: Architecture and Security / Asma Adnane.
Physical Description: xviii, 229 pages ;
Publication Date: [2015]


Title: Guide to security assurance for cloud computing / Shao Ying Zhu, Richard Hill, Marcello Trovati, editors.
Computer communications and networks
Computer communications and networks.

Author: Zhu, Shao Ying, editor.
Hill, Richard, editor.
Trovati, Marcello, editor.

General Notes: Includes index., Includes index.
Publisher: Springer,
Publication Place: Cham New York
ISBN: 3319259865
9783319259864

Subject: Cloud computing -- Security measures.
Series: Computer communications and networks
Computer communications and networks.

Contents: Machine generated contents note: pt. I Key Concepts -- 1.Privacy, Compliance and the Cloud / Chris Mitchell -- 2.Cryptographic Tools for Cloud Environments / Keith M. Martin -- 3.Migrating to Public Clouds -- From a Security Perspective / Lu Liu -- 4.Virtualization Security in Cloud Computing / Shao Ying Zhu -- 5.Security of Cloud-Based Storage / Gaurav Somani -- 6.Cloud Computing Governance, Risk, and Compliance -- The Quintessential Globalization Challenge / Rhonda L. Farrell -- 7.Cloud Computing and Security in the Future / Kenneth Johnston -- pt. II Application and Approaches -- 8.Security Certification for the Cloud: The CUMULUS Approach / Hristo Koshutanski -- 9.Improving Cloud Assurance and Transparency Through Accountability Mechanisms / Christoph Reich -- 10.DDoS Protection and Security Assurance in Cloud / Dheeraj Sanghi -- 11.Cloud Data Auditing Using Proofs of Retrievability / Sushmita Ruj -- 12.Vehicular Cloud Networks: Architecture and Security / Asma Adnane.
Physical Description: xviii, 229 pages ;
Publication Date: [2015]


Title: Fundamentals of Network Forensics A Research Perspective / by R.C. Joshi, Emmanuel S. Pilli.
Computer Communications and Networks,
Computer communications and networks,

Author: Joshi, R.C. author.
Pilli, Emmanuel S. author.
SpringerLink (Online service)

General Notes: Part I: Fundamentals -- Introduction -- Network Forensic Process Models -- Network Forensic Frameworks -- Network Forensics Tools -- Part II: Techniques -- Acquisition -- Network Forensic Analysis -- Attribution -- Part III: Advances -- Botnet Forensics -- Smartphone Forensics -- Cloud Forensics.
This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its core protocols. This, in turn, enables the identification of shortcomings and highlights where improvements can be made for a more secure network. Topics and features: Provides learning objectives in every chapter, and review questions throughout the book to test understanding Introduces the basic concepts of network process models, network forensics frameworks and network forensics tools Discusses various techniques for the acquisition of packets in a network forensics system, network forensics analysis, and attribution in network forensics Examines a range of advanced topics, including botnet forensics, smartphone forensics, and cloud forensics Reviews a number of freely available and easily installable tools for performing forensic activities Researchers and students of network forensics will find this accessible work to provide an ideal technical foundation to the field. The focus on practically useful techniques and tools will also appeal to professional network forensic analysts involved in legal investigations. Prof. Ramesh Chandra Joshi is the Chancellor of Graphic Era University, Dehradun, India. He was formerly a Professor in the Department of Electronics and Computer Engineering at the Indian Institute of Technology Roorkee, India. Dr. Emmanuel Shubhakar Pilli is an Assistant Professor in the Department of Computer Science and Engineering at Malaviya National Institute of Technology, Jaipur, India.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447172994
Subject: Computer science.
Computer communication systems.
Computer security.
Computer science.
Computer Communication Networks.
Systems and Data Security.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Fundamentals -- Introduction -- Network Forensic Process Models -- Network Forensic Frameworks -- Network Forensics Tools -- Part II: Techniques -- Acquisition -- Network Forensic Analysis -- Attribution -- Part III: Advances -- Botnet Forensics -- Smartphone Forensics -- Cloud Forensics.
Physical Description: XV, 214 p. 82 illus., 1 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-7299-4
Publication Date: 2016.


Title: Fundamentals of Network Forensics A Research Perspective / by R.C. Joshi, Emmanuel S. Pilli.
Computer Communications and Networks,
Computer communications and networks,

Author: Joshi, R.C. author.
Pilli, Emmanuel S. author.
SpringerLink (Online service)

General Notes: Part I: Fundamentals -- Introduction -- Network Forensic Process Models -- Network Forensic Frameworks -- Network Forensics Tools -- Part II: Techniques -- Acquisition -- Network Forensic Analysis -- Attribution -- Part III: Advances -- Botnet Forensics -- Smartphone Forensics -- Cloud Forensics.
This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its core protocols. This, in turn, enables the identification of shortcomings and highlights where improvements can be made for a more secure network. Topics and features: Provides learning objectives in every chapter, and review questions throughout the book to test understanding Introduces the basic concepts of network process models, network forensics frameworks and network forensics tools Discusses various techniques for the acquisition of packets in a network forensics system, network forensics analysis, and attribution in network forensics Examines a range of advanced topics, including botnet forensics, smartphone forensics, and cloud forensics Reviews a number of freely available and easily installable tools for performing forensic activities Researchers and students of network forensics will find this accessible work to provide an ideal technical foundation to the field. The focus on practically useful techniques and tools will also appeal to professional network forensic analysts involved in legal investigations. Prof. Ramesh Chandra Joshi is the Chancellor of Graphic Era University, Dehradun, India. He was formerly a Professor in the Department of Electronics and Computer Engineering at the Indian Institute of Technology Roorkee, India. Dr. Emmanuel Shubhakar Pilli is an Assistant Professor in the Department of Computer Science and Engineering at Malaviya National Institute of Technology, Jaipur, India.

Publisher: Springer London : Imprint: Springer,
Publication Place: London :
ISBN: 9781447172994
Subject: Computer science.
Computer communication systems.
Computer security.
Computer science.
Computer Communication Networks.
Systems and Data Security.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Fundamentals -- Introduction -- Network Forensic Process Models -- Network Forensic Frameworks -- Network Forensics Tools -- Part II: Techniques -- Acquisition -- Network Forensic Analysis -- Attribution -- Part III: Advances -- Botnet Forensics -- Smartphone Forensics -- Cloud Forensics.
Physical Description: XV, 214 p. 82 illus., 1 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-1-4471-7299-4
Publication Date: 2016.


Title: Guide to Computing Fundamentals in Cyber-Physical Systems Concepts, Design Methods, and Applications / by Dietmar P.F. Möller.
Computer Communications and Networks,
Computer communications and networks,

Author: Möller, Dietmar P.F. author.
SpringerLink (Online service)

General Notes: Introduction to Systems -- Introduction to Embedded Computing Systems -- Introduction to Cyber-Physical Systems -- Introduction to the Internet of Things -- Ubiquitous Computing -- Systems and Software Engineering -- Digital Manufacturing / Industry 4.0 -- Social Impact on Work Lives of the Future.
This comprehensive guide/reference presents an in-depth review of the state of the art of cyber-physical systems (CPS) and their applications. The text describes the CPS approach in detail, highlighting where the multitude of CPS activities fit within the overall effort, and proposes an ideal framework for understanding the complexity of cyber-physical systems. Relevant case studies are also provided, to help the reader to master the interdisciplinary material. No prior background knowledge is required, other than some familiarity with basic calculus-based probability and statistics, and some experience with systems and software engineering. Topics and features: Includes self-test exercises in each chapter, together with an extensive glossary at the end of the book Offers a variety of teaching support materials at an associated website, including a comprehensive set of slides and lecture videos Presents a brief overview of the study of systems, and embedded computing systems, before defining CPS Introduces the concepts of the Internet of Things, and ubiquitous (or pervasive) computing Reviews the design challenges of CPS, and their impact on systems and software engineering Describes the ideas behind Industry 4.0 and the revolutions in digital manufacturing, including smart and agile manufacturing, as well as cybersecurity in manufacturing Considers the social impact of the changes in skills required by the globalized, digital work environment of the future With a foreword by Prof. Dr. K. B. Akhilesh of the Indian Institute of Science, Bangalore, India Ideally suitable as a textbook for college courses on CPS, this Guide to Computing Fundamentals in Cyber-Physical Systems may also be used as a self-study aid, or as a reference for practitioners and researchers involved in CPS and digital manufacturing/Industry 4.0. Prof. Dr.-Ing. Dietmar P.F. Möller is a Professor in the Institute of Applied Stochastics and Operations Research at Clausthal University of Technology (TUC), Germany, a Member of the Simulation Science Center Clausthal-Göttingen, Germany, and an Adjunct Professor in the Department of Electrical and Computer Engineering at the University of Nebraska-Lincoln (UNL), USA. His other publications include the Springer title Introduction to Transportation Analysis, Modeling and Simulation.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319251783
Subject: Computer science.
Computer communication systems.
Computer science -- Mathematics.
Computational intelligence.
Computer science.
Computer Communication Networks.
Computational intelligence.
Information Systems Applications (incl.Internet).
Math Applications in Computer Science.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction to Systems -- Introduction to Embedded Computing Systems -- Introduction to Cyber-Physical Systems -- Introduction to the Internet of Things -- Ubiquitous Computing -- Systems and Software Engineering -- Digital Manufacturing / Industry 4.0 -- Social Impact on Work Lives of the Future.
Physical Description: XVII, 422 p. 130 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-25178-3
Publication Date: 2016.


Title: Guide to Computing Fundamentals in Cyber-Physical Systems Concepts, Design Methods, and Applications / by Dietmar P.F. Möller.
Computer Communications and Networks,
Computer communications and networks,

Author: Möller, Dietmar P.F. author.
SpringerLink (Online service)

General Notes: Introduction to Systems -- Introduction to Embedded Computing Systems -- Introduction to Cyber-Physical Systems -- Introduction to the Internet of Things -- Ubiquitous Computing -- Systems and Software Engineering -- Digital Manufacturing / Industry 4.0 -- Social Impact on Work Lives of the Future.
This comprehensive guide/reference presents an in-depth review of the state of the art of cyber-physical systems (CPS) and their applications. The text describes the CPS approach in detail, highlighting where the multitude of CPS activities fit within the overall effort, and proposes an ideal framework for understanding the complexity of cyber-physical systems. Relevant case studies are also provided, to help the reader to master the interdisciplinary material. No prior background knowledge is required, other than some familiarity with basic calculus-based probability and statistics, and some experience with systems and software engineering. Topics and features: Includes self-test exercises in each chapter, together with an extensive glossary at the end of the book Offers a variety of teaching support materials at an associated website, including a comprehensive set of slides and lecture videos Presents a brief overview of the study of systems, and embedded computing systems, before defining CPS Introduces the concepts of the Internet of Things, and ubiquitous (or pervasive) computing Reviews the design challenges of CPS, and their impact on systems and software engineering Describes the ideas behind Industry 4.0 and the revolutions in digital manufacturing, including smart and agile manufacturing, as well as cybersecurity in manufacturing Considers the social impact of the changes in skills required by the globalized, digital work environment of the future With a foreword by Prof. Dr. K. B. Akhilesh of the Indian Institute of Science, Bangalore, India Ideally suitable as a textbook for college courses on CPS, this Guide to Computing Fundamentals in Cyber-Physical Systems may also be used as a self-study aid, or as a reference for practitioners and researchers involved in CPS and digital manufacturing/Industry 4.0. Prof. Dr.-Ing. Dietmar P.F. Möller is a Professor in the Institute of Applied Stochastics and Operations Research at Clausthal University of Technology (TUC), Germany, a Member of the Simulation Science Center Clausthal-Göttingen, Germany, and an Adjunct Professor in the Department of Electrical and Computer Engineering at the University of Nebraska-Lincoln (UNL), USA. His other publications include the Springer title Introduction to Transportation Analysis, Modeling and Simulation.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319251783
Subject: Computer science.
Computer communication systems.
Computer science -- Mathematics.
Computational intelligence.
Computer science.
Computer Communication Networks.
Computational intelligence.
Information Systems Applications (incl.Internet).
Math Applications in Computer Science.

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Introduction to Systems -- Introduction to Embedded Computing Systems -- Introduction to Cyber-Physical Systems -- Introduction to the Internet of Things -- Ubiquitous Computing -- Systems and Software Engineering -- Digital Manufacturing / Industry 4.0 -- Social Impact on Work Lives of the Future.
Physical Description: XVII, 422 p. 130 illus. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-25178-3
Publication Date: 2016.


Title: Opportunistic Mobile Networks Advances and Applications / by Sudip Misra, Barun Kumar Saha, Sujata Pal.
Computer Communications and Networks,
Computer communications and networks,

Author: Misra, Sudip. author.
Saha, Barun Kumar. author.
Pal, Sujata. author.
SpringerLink (Online service)

General Notes: Part I: Introduction -- Origins and Characteristics -- Delay Tolerant Routing and Applications -- A Developer’s Guide to the ONE Simulator -- Part II: Human Aspects in Opportunistic Mobile Networks -- Emerging Sensing Paradigms and Intelligence in Networks -- Aspects of Human Emotions and Networks -- Part III: Cooperation in Opportunistic Mobile Networks -- Evolutionary Game in Wireless Networks -- Enforcing Cooperation in OMNs -- Part IV: Advanced Topics -- Heterogeneity in OMNs -- Opportunistic Mobile Networks: Towards Reality -- The Big Picture.
This clearly-written and practically-focused textbook/reference reviews the fundamental theory, varied applications, and latest breakthroughs in Delay Tolerant Networks (DTNs). Presenting a specific focus on Opportunistic Mobile Networks (OMNs), the text carefully considers the influence of human aspects, and examines emerging forms of inter-node cooperation. Readers will learn how to master protocol development and testing, overcome issues of non-cooperative behavior, and address heterogeneity in OMNs and other networks. Topics and features: Contains review terms, study exercises and programming exercises in each chapter, with the solutions and source code available at an associated website Introduces the fundamentals of DTNs, covering OMNs, Pocket Switched Networks (PSNs), and Mission-Oriented Opportunistic Networks (MOONs) Describes the Opportunistic Network Environment (ONE) simulator, explaining how to set up a simulation project using NetBeans, and the version control software Git Provides detailed insights into the development and testing of protocols, together with a set of best practices for increased productivity and optimized performance Examines human aspects in the context of communication networks, from human-centric applications to the impact of emotion on human-network interplay Proposes various schemes for inter-node cooperation in DTNs/OMNs, including incentive-based and game theoretic approaches, as well as the DISCUSS scheme Presents a detailed discussion on aspects of heterogeneity in DTNs, and a comprehensive review of the latest research on DTNs/OMNs Students and instructors will find this easy-to-follow work to be ideally suitable as a textbook for introductory courses on OMNs and advanced courses on communication networks. Researchers will be greatly interested in the descriptions of state-of-the-art developments in OMNs, wireless sensor, and ad hoc networks. Practitioners developing real-world applications will also benefit from the coverage of relevant technical specifications and patents.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319290317
Subject: Computer science.
Philosophy.
Computer communication systems.
Computer simulation.
Sociology.
Computer science.
Computer Communication Networks.
Simulation and Modeling.
Philosophy of Technology.
Sociological Theory.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 1st ed. 2016.
Contents: Part I: Introduction -- Origins and Characteristics -- Delay Tolerant Routing and Applications -- A Developer’s Guide to the ONE Simulator -- Part II: Human Aspects in Opportunistic Mobile Networks -- Emerging Sensing Paradigms and Intelligence in Networks -- Aspects of Human Emotions and Networks -- Part III: Cooperation in Opportunistic Mobile Networks -- Evolutionary Game in Wireless Networks -- Enforcing Cooperation in OMNs -- Part IV: Advanced Topics -- Heterogeneity in OMNs -- Opportunistic Mobile Networks: Towards Reality -- The Big Picture.
Physical Description: XXXII, 303 p. 66 illus., 63 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-29031-7
Publication Date: 2016.


Title: Opportunistic Mobile Networks Advances and Applications / by Sudip Misra, Barun Kumar Saha, Sujata Pal.
Computer Communications and Networks,
Computer communications and networks,

Author: Misra, Sudip. author.
Saha, Barun Kumar. author.
Pal, Sujata. author.
SpringerLink (Online service)

General Notes: Part I: Introduction -- Origins and Characteristics -- Delay Tolerant Routing and Applications -- A Developer’s Guide to the ONE Simulator -- Part II: Human Aspects in Opportunistic Mobile Networks -- Emerging Sensing Paradigms and Intelligence in Networks -- Aspects of Human Emotions and Networks -- Part III: Cooperation in Opportunistic Mobile Networks -- Evolutionary Game in Wireless Networks -- Enforcing Cooperation in OMNs -- Part IV: Advanced Topics -- Heterogeneity in OMNs -- Opportunistic Mobile Networks: Towards Reality -- The Big Picture.
This clearly-written and practically-focused textbook/reference reviews the fundamental theory, varied applications, and latest breakthroughs in Delay Tolerant Networks (DTNs). Presenting a specific focus on Opportunistic Mobile Networks (OMNs), the text carefully considers the influence of human aspects, and examines emerging forms of inter-node cooperation. Readers will learn how to master protocol development and testing, overcome issues of non-cooperative behavior, and address heterogeneity in OMNs and other networks. Topics and features: Contains review terms, study exercises and programming exercises in each chapter, with the solutions and source code available at an associated website Introduces the fundamentals of DTNs, covering OMNs, Pocket Switched Networks (PSNs), and Mission-Oriented Opportunistic Networks (MOONs) Describes the Opportunistic Network Environment (ONE) simulator, explaining how to set up a simulation project using NetBeans, and the version control software Git Provides detailed insights into the development and testing of protocols, together with a set of best practices for increased productivity and optimized performance Examines human aspects in the context of communication networks, from human-centric applications to the impact of emotion on human-network interplay Proposes various schemes for inter-node cooperation in DTNs/OMNs, including incentive-based and game theoretic approaches, as well as the DISCUSS scheme Presents a detailed discussion on aspects of heterogeneity in DTNs, and a comprehensive review of the latest research on DTNs/OMNs Students and instructors will find this easy-to-follow work to be ideally suitable as a textbook for introductory courses on OMNs and advanced courses on communication networks. Researchers will be greatly interested in the descriptions of state-of-the-art developments in OMNs, wireless sensor, and ad hoc networks. Practitioners developing real-world applications will also benefit from the coverage of relevant technical specifications and patents.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319290317
Subject: Computer science.
Philosophy.
Computer communication systems.
Computer simulation.
Sociology.
Computer science.
Computer Communication Networks.
Simulation and Modeling.
Philosophy of Technology.
Sociological Theory.

Series: Computer Communications and Networks,
Computer communications and networks,

Edition: 1st ed. 2016.
Contents: Part I: Introduction -- Origins and Characteristics -- Delay Tolerant Routing and Applications -- A Developer’s Guide to the ONE Simulator -- Part II: Human Aspects in Opportunistic Mobile Networks -- Emerging Sensing Paradigms and Intelligence in Networks -- Aspects of Human Emotions and Networks -- Part III: Cooperation in Opportunistic Mobile Networks -- Evolutionary Game in Wireless Networks -- Enforcing Cooperation in OMNs -- Part IV: Advanced Topics -- Heterogeneity in OMNs -- Opportunistic Mobile Networks: Towards Reality -- The Big Picture.
Physical Description: XXXII, 303 p. 66 illus., 63 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-29031-7
Publication Date: 2016.


Title: Connectivity Frameworks for Smart Devices The Internet of Things from a Distributed Computing Perspective / edited by Zaigham Mahmood.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
SpringerLink (Online service)

General Notes: Part I: Device Connectivity in the Internet of Things -- Securing Device Connectivity in the Industrial IoT -- Security Mechanisms for Connectivity of Smart Devices in the IoT -- Agent-Based Machine-to-Machine Connectivity Analysis for the IoT Environment -- Secure Inter-Vehicle Communication -- Part II: Architecture and Frameworks for the Internet of Things -- A Resource-Oriented Architecture for the IoT -- Integration Approaches for the IoT Era -- Cooperative Device Cloud -- Towards Enabling Clouds for IoT -- Performance Optimization of Intelligent Home Networks -- Network Neutrality in the IoT -- Part III: Security Mechanisms for the Internet of Things -- Data Security and Privacy in the IoT Environment -- Access Control and Authentication in the IoT Environment -- IoT for Developing Smart Sustainable Cities -- Connectivity of Smart Devices.
This timely volume provides a review of the state-of-the-art frameworks and methodologies for connecting diverse objects and devices according to the vision for an Internet of Things (IoT). A specific focus is placed on the communication, security, and privacy aspects of device connectivity in distributed environments. Insights and case studies are provided by an authoritative selection of contributors of international repute into the latest research advances and practical approaches with respect to the connectivity of heterogeneous smart and sensory devices. Topics and features: Examines aspects of device connectivity within the IoT Presents a resource-based architecture for IoT, and proposes a resource management framework for corporate device clouds Reviews integration approaches for the IoT environment, and discusses performance optimization of intelligent home networks Introduces a novel solution for interoperable data management in multi-clouds, and suggests an approach that addresses the debate over network neutrality in the IoT Describes issues of data security, privacy, access control, and authentication in the distributed IoT environment Reviews the evolution of VANETs in relation to the Internet of Vehicles, and provides a perspective on developing smart sustainable cities This invaluable text/reference will be of great benefit to a broad audience, from students and researchers interested in the IoT vision, to practicing communication engineers and network security specialists.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319331249
Subject: Computer science.
Computer communication systems.
Artificial intelligence.
Computer science.
Computer Communication Networks.
Information Systems Applications (incl.Internet).
Artificial Intelligence (incl. Robotics).

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Device Connectivity in the Internet of Things -- Securing Device Connectivity in the Industrial IoT -- Security Mechanisms for Connectivity of Smart Devices in the IoT -- Agent-Based Machine-to-Machine Connectivity Analysis for the IoT Environment -- Secure Inter-Vehicle Communication -- Part II: Architecture and Frameworks for the Internet of Things -- A Resource-Oriented Architecture for the IoT -- Integration Approaches for the IoT Era -- Cooperative Device Cloud -- Towards Enabling Clouds for IoT -- Performance Optimization of Intelligent Home Networks -- Network Neutrality in the IoT -- Part III: Security Mechanisms for the Internet of Things -- Data Security and Privacy in the IoT Environment -- Access Control and Authentication in the IoT Environment -- IoT for Developing Smart Sustainable Cities -- Connectivity of Smart Devices.
Physical Description: XIX, 356 p. 98 illus., 57 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-33124-9
Publication Date: 2016.


Title: Connectivity Frameworks for Smart Devices The Internet of Things from a Distributed Computing Perspective / edited by Zaigham Mahmood.
Computer Communications and Networks,
Computer communications and networks,

Author: Mahmood, Zaigham. editor.
SpringerLink (Online service)

General Notes: Part I: Device Connectivity in the Internet of Things -- Securing Device Connectivity in the Industrial IoT -- Security Mechanisms for Connectivity of Smart Devices in the IoT -- Agent-Based Machine-to-Machine Connectivity Analysis for the IoT Environment -- Secure Inter-Vehicle Communication -- Part II: Architecture and Frameworks for the Internet of Things -- A Resource-Oriented Architecture for the IoT -- Integration Approaches for the IoT Era -- Cooperative Device Cloud -- Towards Enabling Clouds for IoT -- Performance Optimization of Intelligent Home Networks -- Network Neutrality in the IoT -- Part III: Security Mechanisms for the Internet of Things -- Data Security and Privacy in the IoT Environment -- Access Control and Authentication in the IoT Environment -- IoT for Developing Smart Sustainable Cities -- Connectivity of Smart Devices.
This timely volume provides a review of the state-of-the-art frameworks and methodologies for connecting diverse objects and devices according to the vision for an Internet of Things (IoT). A specific focus is placed on the communication, security, and privacy aspects of device connectivity in distributed environments. Insights and case studies are provided by an authoritative selection of contributors of international repute into the latest research advances and practical approaches with respect to the connectivity of heterogeneous smart and sensory devices. Topics and features: Examines aspects of device connectivity within the IoT Presents a resource-based architecture for IoT, and proposes a resource management framework for corporate device clouds Reviews integration approaches for the IoT environment, and discusses performance optimization of intelligent home networks Introduces a novel solution for interoperable data management in multi-clouds, and suggests an approach that addresses the debate over network neutrality in the IoT Describes issues of data security, privacy, access control, and authentication in the distributed IoT environment Reviews the evolution of VANETs in relation to the Internet of Vehicles, and provides a perspective on developing smart sustainable cities This invaluable text/reference will be of great benefit to a broad audience, from students and researchers interested in the IoT vision, to practicing communication engineers and network security specialists.

Publisher: Springer International Publishing : Imprint: Springer,
Publication Place: Cham :
ISBN: 9783319331249
Subject: Computer science.
Computer communication systems.
Artificial intelligence.
Computer science.
Computer Communication Networks.
Information Systems Applications (incl.Internet).
Artificial Intelligence (incl. Robotics).

Series: Computer Communications and Networks,
Computer communications and networks,

Contents: Part I: Device Connectivity in the Internet of Things -- Securing Device Connectivity in the Industrial IoT -- Security Mechanisms for Connectivity of Smart Devices in the IoT -- Agent-Based Machine-to-Machine Connectivity Analysis for the IoT Environment -- Secure Inter-Vehicle Communication -- Part II: Architecture and Frameworks for the Internet of Things -- A Resource-Oriented Architecture for the IoT -- Integration Approaches for the IoT Era -- Cooperative Device Cloud -- Towards Enabling Clouds for IoT -- Performance Optimization of Intelligent Home Networks -- Network Neutrality in the IoT -- Part III: Security Mechanisms for the Internet of Things -- Data Security and Privacy in the IoT Environment -- Access Control and Authentication in the IoT Environment -- IoT for Developing Smart Sustainable Cities -- Connectivity of Smart Devices.
Physical Description: XIX, 356 p. 98 illus., 57 illus. in color. online resource.
Electronic Location: http://dx.doi.org/10.1007/978-3-319-33124-9
Publication Date: 2016.