Norges billigste bøker

Bøker i Computer Communications and Networks-serien

Filter
Filter
Sorter etterSorter Serierekkefølge
  • - Advances and Trends in Cloud Computing
     
    730,-

    This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. reviews existing elasticity management solutions, discusses the relationship between cloud management and governance, and describes the development of a cloud service capability assessment model;

  • - Concepts, Design Methods, and Applications
    av Dietmar P.F. Moeller
    1 169,-

    This book presents an in-depth review of the state of the art of cyber-physical systems (CPS) and their applications. presents a brief overview of the study of systems, and embedded computing systems, before defining CPS;

  • - Toward An Open Smart-Home Infrastructure
     
    1 174,-

    Smart Homes (SH) offer a promising approach to assisted living for the ageing population. Yet the main obstacle to the rapid development and deployment of Smart Home (SH) solutions essentially arises from the nature of the SH field, which is multidisciplinary and involves diverse applications and various stakeholders. Accordingly, an alternative to a one-size-fits-all approach is needed in order to advance the state of the art towards an open SH infrastructure.This book makes a valuable and critical contribution to smart assisted living research through the development of new effective, integrated, and interoperable SH solutions. It focuses on four underlying aspects: (1) Sensing and Monitoring Technologies; (2) Context Interference and Behaviour Analysis; (3) Personalisation and Adaptive Interaction, and (4) Open Smart Home and Service Infrastructures, demonstrating how fundamental theories, models and algorithms can be exploited to solve real-world problems.This comprehensive and timely book offers a unique and essential reference guide for policymakers, funding bodies, researchers, technology developers and managers, end users, carers, clinicians, healthcare service providers, educators and students, helping them adopt and implement smart assisted living systems.

  •  
    1 759,-

    Part 1 - Cloud Requirements Engineering and Domain Modelling: 1. Requirement Engineering Framework for Service and Cloud Computing (REF-SCC).- 2. Towards an Effective Requirement Engineering Approach for Cloud Applications.- 3. Requirements Engineering for Large-Scale Big Data Applications.- 4. Migrating from Monoliths to Cloud-Based Microservices: A Banking Industry Example.- 5. Cloud Enabled Domain Based Software Development.- 6. Security Challenges in Software Engineering for the Cloud: A Systematic Review. Part 2 - Cloud Design and Software Engineering Analytics with Machine Learning Approaches : 7. Software Engineering Framework for Software Defect Management Using Machine Learning Techniques with Azure.- 8. Sentiment Analysis of Twitter Data Through Machine Learning Techniques.- 9. Connection Handler: A Design Pattern for Recovery from Connection Crashes. Part 3 : Cloud Testing and Software Process Improvement as a Service : 10. A Modern Perspective on Cloud Testing Ecosystems.- 11. Towards Green Software Testing in Agile and DevOps using Cloud Virtualization for Environmental Protection.- 12. Machine Learning as a Service for Software Process Improvement.- 13. Comparison of Data Mining Techniques in the Cloud for Software Engineering.

  • - Toward An Open Smart-Home Infrastructure
     
    1 675,-

    Smart Homes (SH) offer a promising approach to assisted living for the ageing population. Yet the main obstacle to the rapid development and deployment of Smart Home (SH) solutions essentially arises from the nature of the SH field, which is multidisciplinary and involves diverse applications and various stakeholders. Accordingly, an alternative to a one-size-fits-all approach is needed in order to advance the state of the art towards an open SH infrastructure.This book makes a valuable and critical contribution to smart assisted living research through the development of new effective, integrated, and interoperable SH solutions. It focuses on four underlying aspects: (1) Sensing and Monitoring Technologies; (2) Context Interference and Behaviour Analysis; (3) Personalisation and Adaptive Interaction, and (4) Open Smart Home and Service Infrastructures, demonstrating how fundamental theories, models and algorithms can be exploited to solve real-world problems.This comprehensive and timely book offers a unique and essential reference guide for policymakers, funding bodies, researchers, technology developers and managers, end users, carers, clinicians, healthcare service providers, educators and students, helping them adopt and implement smart assisted living systems.

  • - Blocking, Scalability, and Reliability
    av Mohsen Jahanshahi & Fathollah Bistouni
    730,-

    This unique text/reference provides an overview of crossbar-based interconnection networks, offering novel perspectives on these important components of high-performance, parallel-processor systems. A particular focus is placed on solutions to the blocking and scalability problems.Topics and features: introduces the fundamental concepts in interconnection networks in multi-processor systems, including issues of blocking, scalability, and crossbar networks; presents a classification of interconnection networks, and provides information on recognizing each of the networks; examines the challenges of blocking and scalability, and analyzes the different solutions that have been proposed; reviews a variety of different approaches to improve fault tolerance in multistage interconnection networks; discusses the scalable crossbar network, which is a non-blocking interconnection network that uses small-sized crossbar switches as switching elements.This invaluable work will be of great benefit to students, researchers and practitioners interested in computer networks, parallel processing and reliability engineering. The text is also essential reading for course modules on interconnection network design and reliability.

  • - An Artificial Intelligence Approach
     
    804,-

    This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms.Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process.In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.

  • - Development and Governance Frameworks
     
    1 841,-

    This invaluable text/reference investigates the state of the art in approaches to building, monitoring, managing, and governing smart cities. A particular focus is placed on the distributed computing environments within the infrastructure of such cities, including issues of device connectivity, communication, security, and interoperability. A selection of experts of international repute offer their perspectives on current trends and best practices, and their suggestions for future developments, together with case studies supporting the vision of smart cities based on the Internet of Things (IoT).Topics and features: examines the various methodologies relating to next-level urbanization, including approaches to security and privacy relating to social and legal aspects; describes a recursive and layered approach to modeling large-scale resource management systems for self-sustainable cities; proposes a novel architecture for hybrid vehicular wireless sensor networks, and a pricing mechanism for the management of natural resources; discusses the challenges and potential solutions to building smart city surveillance systems, applying knowledge-based governance, and adopting electric vehicles; covers topics on intelligent distributed systems, IoT, fog computing paradigms, big data management and analytics, and smart grids; reviews issues of sustainability in the design of smart cities and healthcare services, illustrated by case studies taken from cities in Japan, India, and Brazil.This illuminating volume offers a comprehensive reference for researchers investigating smart cities and the IoT, students interested in the distributed computing technologies used by smart living systems, and practitioners wishing to adopt the latest security and connectivity techniques in smart city environments.

  • - Challenges and Solutions
     
    1 397,-

    introduces a mobile IoT simulator designed to evaluate the behavior of IoT systems, in addition to a novel approach to manage hyper-connectivity in the IoT;

  • - Example Algorithms for Selected Applications
     
    693,-

    This useful text/reference describes the implementation of a varied selection of algorithms in the DataFlow paradigm, highlighting the exciting potential of DataFlow computing for applications in such areas as image understanding, biomedicine, physics simulation, and business.The mapping of additional algorithms onto the DataFlow architecture is also covered in the following Springer titles from the same team: DataFlow Supercomputing Essentials: Research, Development and Education, DataFlow Supercomputing Essentials: Algorithms, Applications and Implementations, and Guide to DataFlow Supercomputing.Topics and Features: introduces a novel method of graph partitioning for large graphs involving the construction of a skeleton graph; describes a cloud-supported web-based integrated development environment that can develop and run programs without DataFlow hardware owned by the user; showcases a new approach for the calculation of the extrema of functions in one dimension, by implementing the Golden Section Search algorithm; reviews algorithms for a DataFlow architecture that uses matrices and vectors as the underlying data structure; presents an algorithm for spherical code design, based on the variable repulsion force method; discusses the implementation of a face recognition application, using the DataFlow paradigm; proposes a method for region of interest-based image segmentation of mammogram images on high-performance reconfigurable DataFlow computers; surveys a diverse range of DataFlow applications in physics simulations, and investigates a DataFlow implementation of a Bitcoin mining algorithm.This unique volume will prove a valuable reference for researchers and programmers of DataFlow computing, and supercomputing in general. Graduate and advanced undergraduate students will also find that the book serves as an ideal supplementary text for courses on Data Mining, Microprocessor Systems, and VLSI Systems.

  • - Trends, Technologies, Innovations and Applications
    av Dietmar P.F. Moller
    1 299,-

    This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications. The text describes the challenges of the global automotive market, clearly showing where the multitude of innovative activities fit within the overall effort of cutting-edge automotive innovations, and provides an ideal framework for understanding the complexity of automotive connectivity and cybersecurity.Topics and features: discusses the automotive market, automotive research and development, and automotive electrical/electronic and software technology; examines connected cars and autonomous vehicles, and methodological approaches to cybersecurity to avoid cyber-attacks against vehicles; provides an overview on the automotive industry that introduces the trends driving the automotive industry towards smart mobility and autonomous driving; reviews automotive research and development, offering background on the complexity involved in developing new vehicle models; describes the technologies essential for the evolution of connected cars, such as cyber-physical systems and the Internet of Things; presents case studies on Car2Go and car sharing, car hailing and ridesharing, connected parking, and advanced driver assistance systems; includes review questions and exercises at the end of each chapter.The insights offered by this practical guide will be of great value to graduate students, academic researchers and professionals in industry seeking to learn about the advanced methodologies in automotive connectivity and cybersecurity.

  • - Technologies, Implications and Solutions
     
    919,-

    This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics.

  • - Concepts, Algorithms and Methods
    av G. Kousalya, P. Balakrishnan & C. Pethuru Raj
    596,-

  • av Jacek Rak
    663,-

    The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs).

  • - Challenges, Limitations and R&D Solutions
     
    1 397,-

    This book reviews the challenging issues that present barriers to greater implementation of the cloud computing paradigm, together with the latest research into developing potential solutions. discusses a methodology for cloud security management, and proposes a framework for secure data storage and identity management in the cloud;

  • - Principles, Systems and Applications
     
    2 069,-

    This practically-focused reference presents a comprehensive overview of the state of the art in Cloud Computing, and examines the potential for future Cloud and Cloud-related technologies to address specific industrial and research challenges.

  • - Making Smart Grid Real
    av Kenneth C. Budka, Jayant G. Deshpande & Marina Thottan
    1 397,-

    This book covers such cutting-edge applications in communications as advanced metering infrastructure, distribution automation, demand response and synchrophasors. Discusses transformation of integrated networks via smart grid architecture format.

  • - Network Application Programming with Java
    av Bogdan Ciubotaru & Gabriel-Miro Muntean
    771,-

    This book introduces theoretical and practical aspects of computer networks and network programming, surveying current developments in network architecture, communication protocols and programming techniques, supported by code examples for hands-on practice.

  •  
    1 397,-

    The book offers both a discussion of relevant software engineering approaches and practical guidance on enterprise-wide software deployment in the cloud environment, together with real-world case studies.

  • - New Frontiers for Electronic Business
     
    1 334,-

    Moreover, the rate of technological innovation is such that to the c- sumer, technology implementation is fully opaque.Nonetheless, opportunities to carry out commerce in novel ways also introduce risk to established - cial structures, conventions, and institutions.

  • Spar 12%
    - Evolving Distributed Communities
    av Andrew Harrison & Ian J. Taylor
    567,-

    This new edition provides a comprehensive overview of emerging distributed-systems technologies and includes many state-of-the-art infrastructures and technologies. It also offers exercises and historical contexts for each of the technologies.

  •  
    1 397,-

    This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems;

  • - Security and Device Connectivity, Smart Environments, and Industry 4.0
     
    1 824,-

    This book has a focus on the development and deployment of the Industrial Internet of Things (IIoT) paradigm, discussing frameworks, methodologies, benefits and limitations, as well as providing case studies of employing the IoT vision in the industrial domain. IIoT is becoming an attractive business reality for many organisations such as manufacturing, logistics, oil and gas, energy and other utilities, mining, aviation, and many more. The opportunities for this paradigm are huge, and according to one report, the IIoT market is predicted to reach $125 billion by 2021. The driving philosophy behind the IIoT is that smart machines are better than humans at accurately capturing, analysing and communicating real-time data. The underlying technologies include distributed computing, machine learning, artificial intelligence, and machine-to-machine communication, with a typical IIoT system consisting of intelligent systems (applications, controllers, sensors, and security mechanisms), data communication infrastructure (cloud computing, edge computing, etc.), data analytics (to support business intelligence and corporate decision making), and most importantly the human element. The promised benefits of the IIoT include enhanced safety, better reliability, smart metering, inventory management, equipment tracking, and facilities management. There are, however, numerous issues that are also becoming the focus of active research, such as concerns regarding service availability, data security, and device communication. Lack of ubiquitous interoperability between heterogeneous devices is also a major concern.This book intends to fill a gap in the IIoT literature by providing the scientific contributions and latest developments from researchers and practitioners of international repute, focusing on frameworks, methodologies, benefits, and inherent issues/barriers to connected environments, especially in industrial settings.The intendedaudience includes network specialists, hardware engineers, and security experts who wish to adopt newer approaches for device connectivity, IoT security, and sensor-based devices design. University level students, researchers and practitioners will also find the latest innovation in technology and newer approaches relevant to the IIoT from a distributed computing perspective.

  • - Quality-of-Service Architectures and Techniques for Traffic Management
    av Andrzej Jajszczyk, Jerzy Domzal & Robert Wojcik
    771,-

    This book provides a practical guide to flow-aware networking (FAN), one of the most promising new quality-of-service architectures for the Future Internet. analyzes aspects of fair transmission in FAN, reviewing algorithms that improve transmission of streaming flows during network failures;

  • - Configuration and Operation Middleware
    av Jose Cecilio & Pedro Furtado
    730,-

    This book presents an examination of the middleware that can be used to configure and operate heterogeneous node platforms and sensor networks. provides a detailed examination of platform-agnostic middleware architecture, including important implementation details;

  • - Computing Systems and Approaches
    av Pethuru Raj, Anupama C. Raman, Dhivya Nagaraj & m.fl.
    1 437,-

    This book presents a detailed review of high-performance computing infrastructures for next-generation big data and fast data analytics. describes the network infrastructure requirements for effective transfer of big data, and the storage infrastructure requirements of applications which generate big data;

  • - Life-Cycle Methods for Developing Scalable and Reliable Tools
     
    1 437,-

    This unique volume explores cutting-edge management approaches to developing complex software that is efficient, scalable, sustainable, and suitable for distributed environments. Practical insights are offered by an international selection of pre-eminent authorities, including case studies, best practices, and balanced corporate analyses. Emphasis is placed on the use of the latest software technologies and frameworks for life-cycle methods, including the design, implementation and testing stages of software development. Topics and features:· Reviews approaches for reusability, cost and time estimation, and for functional size measurement of distributed software applications· Discusses the core characteristics of a large-scale defense system, and the design of software project management (SPM) as a service· Introduces the 3PR framework, research on crowdsourcing software development, and an innovative approach to modeling large-scale multi-agent software systems· Examines a system architecture for ambient assisted living, and an approach to cloud migration and management assessment· Describes a software error proneness mechanism, a novel Scrum process for use in the defense domain, and an ontology annotation for SPM in distributed environments· Investigates the benefits of agile project management for higher education institutions, and SPM that combines software and data engineering This important text/reference is essential reading for project managers and software engineers involved in developing software for distributed computing environments. Students and researchers interested in SPM technologies and frameworks will also find the work to be an invaluable resource. Prof. Zaigham Mahmood is a Senior Technology Consultant at Debesis Education UK and an Associate Lecturer (Research) at the University of Derby, UK. He also holds positions as Foreign Professor at NUST and IIU in Islamabad, Pakistan, and Professor Extraordinaire at the North West University Potchefstroom, South Africa.

  • - Security in the Information Environment
    av Gerald L. Kovacich & Andrew Blyth
    2 138,-

    This updated edition will help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets. The book uniquely bridges the gap between information security, information systems security and information warfare.

  • av Joseph Migga Kizza
    1 169,-

    This fully revised and updated new edition of the definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the technology we depend on.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.