You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Metaverse Communication and Computing Networks Understand the future of the Internet with this wide-ranging analysis “Metaverse” is the term for applications that allow users to assume digital avatars to interact with other humans and software functions in a three-dimensional virtual space. These applications and the spaces they create constitute an exciting and challenging new frontier in digital communication. Surmounting the technological and conceptual barriers to creating the Metaverse will require researchers and engineers familiar with its underlying theories and a wide range of technologies and techniques. Metaverse Communication and Computing Networks provides a comprehensive tr...
Computer Science and Convergence is proceedings of the 3rd FTRA International Conference on Computer Science and its Applications (CSA-11) and The 2011 FTRA World Convergence Conference (FTRA WCC 2011). The topics of CSA and WCC cover the current hot topics satisfying the world-wide ever-changing needs. CSA-11 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applications and will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA. In addition, the conference will publish high quality papers which are closely related to the various theories and practical app...
With the advance of wireless networks, building reliable and secured network connections is becoming extremely important. On the other hand, ad hoc networks become especially important and have many useful applications. The primary focus of this book is to present these two hot and rapidly evolving areas in wireless networks. Security and scheduling/routing in wireless networks remain challenging research problems due to the complexity involved. How to develop more efficient and reliable wireless networks remains a hot research area. It is this realisation that has motivated the editing of this book. The goal of the book is to serve as a reference for both security in wireless networks and channel access, scheduling, and routing in ad hoc networks. In this book, the authors review important developments and new strategies for these topics. Important features and limitations of methods and models are identified. Consequently, this book can serve as a useful reference for researchers, educators, graduate students, and practitioners in the field of wireless networks. This book contains 14 invited chapters from prominent researchers working in this area around the world. All of the cha
After the collapse of the Qing dynasty in 1911 and the rise of a vernacular language movement, most scholars and writers declared the classical Chinese poetic tradition to be dead. But how could a longstanding high poetic form simply grind to a halt, even in the face of tumultuous social change? In this groundbreaking book, Shengqing Wu explores the transformation of Chinese classical-style poetry in the early twentieth century. Drawing on extensive archival research into the poetry collections and literary journals of two generations of poets and critics, Wu discusses the continuing significance of the classical form with its densely allusive and intricately wrought style. She combines clos...
Wireless technologies and applications are becoming one of the fastest growing and most promising areas in recent years. To accommodate data transmission by multiple stations sharing the scarce wireless bandwidth, a medium access control (MAC) protocol plays a crucial role in scheduling packet transmission fairly and efficiently. The emerging wireless networks, such as ad-hoc networks, sensor networks or mesh networks, are mostly multi-hop based and in distributed manner, which brings a lot of problems and challenges in designing fine-tuned MAC protocols tailored for modern wireless network. In this book, the authors give complete and in-depth overviews to the classic medium access control a...
This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2006, held in Hong Kong, China in December 2006. The 73 revised full papers address all current issues in mobile ad hoc and sensor networks and are organized in topical sections on routing, network protocols, security, energy efficiency, data processing, and deployment.
This book constitutes the refereed proceedings of the Second International Conference on E-business and Telecommunication Networks, ICETE 2005. The 85 revised full papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on global communication information systems and services, security and reliability in information systems and networks, wireless communication systems and networks, and multimedia signal processing.
This book gives a comprehensive presentation of cutting-edge research in communication networks with a combinatorial optimization component. The objective of the book is to advance and promote the theory and applications of combinatorial optimization in communication networks. Each chapter is written by an expert dealing with theoretical, computational, or applied aspects of combinatorial optimization.