You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
New paradigms for communication/networking systems are needed in order to tackle the emerging issues such as heterogeneity, complexity and management of evolvable infrastructures. In order to realize such advanced systems, approaches should become task- and knowledge-driven, enabling a service-oriented, requirement, and trust-driven development of communication networks. The networking and seamless integration of concepts, technologies and devices in a dynamically changing environment poses many challenges to the research community, including interoperability, programmability, management, openness, reliability, performance, context awareness, intelligence, autonomy, security, privacy, safety, and semantics. This edited volume explores the challenges of technologies to realize the vision where devices and applications seamlessly interconnect, intelligently cooperate, and autonomously manage themselves, and as a result, the borders of virtual and real world vanish or become significantly blurred.
This volume contains the proceedings of the Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, NETCON 2005. The conference, organized by the International Federation for Information Processing, was held in Lannion, France from November 14-18, 2005. Coverage explores network security, network policy, quality of service, wireless networks, intelligent networks, and performance evaluation.
Service and network providers must be able to satisfy the demands for new services; improve the quality of service; reduce the cost of network service operations and maintenance; control performance; and adapt to user demands. It is essential to investigate different approaches for performing such tasks. One of these approaches is based on policies and the capability of the network to adapt itself to current conditions. With a focus on policy-based networking, this volume addresses the problem of network control and the introduction of policies such as the control of the Quality of Service, security, mobility, performance, mobile and intelligent agents, and traffic engineering. The area of c...
This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019. The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things.
This book constitutes the refereed proceedings of the Third International Conference on Wireless Mobile Communication and Healthcare, MobiHealth 2012, and of the two workshops: Workshop on Advances in Personalized Healthcare Services, Wearable Mobile Monitoring, and Social Media Pervasive Technologies (APHS 2012), and Workshop on Advances in Wireless Physical Layer Communications for Emerging Healthcare Applications (IWAWPLC 2012), all held in Paris, France, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 66 submissions. The papers are organized in topical sections covering wearable, outdoor and home-based applications; remote diagnosis and patient management; data processing; sensor devices and systems; biomedical monitoring in relation to society and the environment; body area networks; telemedicine systems for disease-specific applications; data collection and management; papers from the invited session "Implants"; papers from the IWAWPLC and APHS workshops.
This book constitutes the refereed proceedings of the First International IFIP TC6 Conference on Autonomic Networking, AN 2006. The 24 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on autonomic networks, self-configuration, autonomic platform and services, autonomic management and discovery policy-based management, ad hoc, sensor and ambient autonomic networks, and autonomic control of mobile networks.
This book constitutes the thoroughly refereed proceedings of the fourth International Conference on Ad Hoc Networks, ADHOCNETS 2012, held in Paris, France, in October 2012. The 18 revised full papers presented were carefully selected and reviewed from 43 submissions. These – and 6 invited papers now cover and even broader scope, referring to many types of autonomous wireless networks designed and deployed for a specific task or function, such as wireless sensor networks, vehicular networks, and home networks. They are organized in topical sections on MAC and PHY layers, localization and position-based protocols in WSNs, resource allocations and cognitive radio, key, service and caching management, network architectures and frameworks, and mobility and disconnection management.
This book constitutes the proceedings of the 14th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2019, held in Colmar, France, in May 2019. The 9 full papers and 1 short paper in this volume were carefully reviewed and selected from 15 submissions. The volume features contributions in the theory or practice of intelligent transportation systems (ITS) and communication technologies for: - Vehicles on the road: e.g. cars, trucks and buses; - Air: e.g. aircraft and unmanned aerial vehicles; and - Rail: e.g. trains, metros and trams.
The Internet of Things (IoT) has contributed greatly to the growth of data traffic on the Internet. Access technologies and object constraints associated with the IoT can cause performance and security problems. This relates to important challenges such as the control of radio communications and network access, the management of service quality and energy consumption, and the implementation of security mechanisms dedicated to the IoT. In response to these issues, this book presents new solutions for the management and control of performance and security in the IoT. The originality of these proposals lies mainly in the use of intelligent techniques. This notion of intelligence allows, among other things, the support of object heterogeneity and limited capacities as well as the vast dynamics characterizing the IoT.