You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This innovative collection of original essays showcases the use of social networks in the analysis and understanding of various forms of crime. More than any other past research endeavor, the seventeen chapters in this book apply to criminology the many conceptual and methodological options from social network analysis. Crime and Networks is the only book of its kind that looks at the use of networks in understanding crime, and can be used for advanced undergraduate and beginner’s graduate level courses in criminal justice and criminology.
This volume contains a selection of authoritative essays exploring the central questions raised by the conjectured technological singularity. In informed yet jargon-free contributions written by active research scientists, philosophers and sociologists, it goes beyond philosophical discussion to provide a detailed account of the risks that the singularity poses to human society and, perhaps most usefully, the possible actions that society and technologists can take to manage the journey to any singularity in a way that ensures a positive rather than a negative impact on society. The discussions provide perspectives that cover technological, political and business issues. The aim is to bring clarity and rigor to the debate in a way that will inform and stimulate both experts and interested general readers.
This book constitutes the refereed proceedings of the 10th European Conference on Wireless Sensor Networks, EWSN 2013, held in Ghent, Belgium, in February 2013. The 12 revised full papers presented were carefully reviewed and selected from 51 submissions. The papers cover a wide range of topics in the following areas: experimentation and data access; data management; network algorithms and protocols; and physical layer and hardware aspects.
Using wireless sensor networks as part of pervasive computing scenarios is a difficult problem. It involves providing functionality and node behavior required by pervasive computing applications given the very limited capabilities and the constraints of wireless sensor nodes. The goal of this work is to investigate the problem of integrating wireless sensor nodes and wireless sensor networks in pervasive computing scenarios and to develop solutions that facilitate such an integration. Based on an analysis of both research areas, of their specific properties and requirements as well as the similarities and differences of the two fields, we identify and discuss a set of five fundamental problem areas that complicate the integration of sensor networks and pervasive computing: communication, network setup and configuration, user experience, security and flexibility and adaptability. In the main part of this work, we then introduce a total of six solution approaches that deal with different aspects of the identified problem areas.
Multihop Mobile Wireless Networks discusses issues pertaining to each of these networks and proposes novel and innovative algorithms on Scheduling, Routing and Data aggregation that are viable solutions for multihop mobile networks.
NMR of Ordered Liquids gives a unique overview of the scope and limitations of the NMR of oriented liquids, based on contributions from acknowledged experts in the field. The book consists of four sections: -detailed general introduction which covers the basic principles and sophisticated experimental techniques; -wide variety of applications ranging from NMR studies of small atoms and molecules in anisotropic liquids to the utilization of residual dipolar couplings for structure determination of biological molecules; -summary of the sophisticated theoretical treatments, computer simulations, and phenomenological models for anisotropic intermolecular interactions that are widely used in the analysis of experimental results; -overview of the dynamical aspects and relaxation processes relevant for orientationally ordered molecules.
The LNCS series report state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R & D community, with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science research forum available. The scope of LNCS, including its subseries LNAI and LNBI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes proceedings (published in time for the respective conference) ...
The authors bring together all the diverse information network professionals and developers need to build IP-based multimedia and voice networks, including coverage on key technologies, protocols, standards, security, access, and more.
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.
Welcometothe6thInternationalWorkshoponPassiveandActiveMeasurement, held in Boston, Massuchusetts. PAM 2005 was organized by Boston University, with ?nancial support from Endace Measurement Systems and Intel. PAM continues to grow and mature as a venue for research in all aspects of Internet measurement. This trend is being driven by increasing interest and activity in the ?eld of Internet measurement. To accommodate the increasing interest in PAM, this year the workshop added a Steering Committee, whose members will rotate, to provide continuity and oversight of the PAM workshop series. PAMplaysaspecialroleinthemeasurementcommunity. Itemphasizespr- matic, relevant research in the area of net...