You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The book shows how researchers, practitioners, and designers can improve user experiences with technology by understanding various user learning styles and characteristics when they interact with new and challenging applications and interfaces. Quality of experience in this new technological environment is affected by the learning curve involved in being able to use the new interfaces in a satisfactory way. The author explores the variations in quality of experience when considering learning and ethics when interacting with new, emerging technologies. The author shows how results can be applied to technologies such as big data, AI, 5G, and Internet of Things (IoT). Taken into account are als...
A mathematical tool for scientists and researchers who work with computer and communication networks, Game Theory in Communication Networks: Cooperative Resolution of Interactive Networking Scenarios addresses the question of how to promote cooperative behavior in interactive situations between heterogeneous entities in communication networking scenarios. It explores network design and management from a theoretical perspective, using game theory and graph theory to analyze strategic situations and demonstrate profitable behaviors of the cooperative entities. The book promotes the use of Game Theory to address important resource management and security issues found in next generation communic...
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.
This book introduces a unique perspective on the use of data from popular emerging technologies and the effect on user quality of experience (QoE). The term data is first refined into specific types of data such as financial data, personal data, public data, context data, generated data, and the popular big data. The book focuses the responsible use of data, with consideration to ethics and wellbeing, in each setting. The specific nuances of different technologies bring forth interesting case studies, which the book breaks down into mathematical models so they can be analyzed and used as powerful tools. Overall, this perspective on the use of data from popular emerging technologies and the resulting QoE analysis will greatly benefit researchers, educators and students in fields related to ICT studies, especially where there is additional interest in ethics and wellbeing, user experience, data management, and their link to emerging technologies.
Fourth Generation (4G) wireless communication systems support current and emergent multimedia services such as mobile TV, social networks and gaming, high-definition TV, video teleconferencing, and messaging services. These systems feature the All-over-IP concept and boast improved quality of service. Several important R&D activities are currently under way in the field of wireless communications for 4G systems, but the coverage is widespread in the literature. Transmission Techniques for 4G Systems presents a compilation of the latest developments in the field of wireless communications for 4G systems, including evolved Multimedia Broadcast and Multicast Service (eMBMS). Topics include: Tra...
Green Communications and Networking introduces novel solutions that can bring about significant reductions in energy consumption in the information and communication technology (ICT) industry-as well as other industries, including electric power. Containing the contributions of leading experts in the field, it examines the latest research advances
This book constitutes the refereed proceedings of the 4th International IFIP-TC6 Networking Conference, NETWORKING 2005, held in Waterloo, Canada in May 2005. The 105 revised full papers and 36 posters were carefully reviewed and selected from 430 submissions. The papers are organized in topical sections on peer-to-peer networks, Internet protocols, wireless security, network security, wireless performance, network service support, network modeling and simulation, wireless LAN, optical networks, Internet performance and Web applications, ad-hoc networks, adaptive networks, radio resource management, Internet routing, queuing models, monitoring, network management, sensor networks, overlay multicast, QoS, wirless scheduling, multicast traffic management and engineering, mobility management, bandwith management, DCMA, and wireless resource management.
This book constitutes the refereed proceedings of the 10th International Joint Conference on E-Business and Telecommunications, ICETE 2013, held in Reykjavik, Iceland, in July 2013. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP. The 24 full papers presented were carefully reviewed and selected from 341 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, wireless information networks and systems.
This book shows how to model selected communication scenarios using game theory. The book helps researchers specifically dealing with scenarios motivated by the increasing use of the Internet of Things (IoT) and 5G Communications by using game theory to approach the study of such challenging scenarios. The author explains how game theory acts as a mathematical tool that models decision making in terms of strategies and mechanisms that can result in optimal payoffs for a number of interacting entities, offering often antagonistic behaviors. The book explores new technologies in terms of design, development and management from a theoretical perspective, using game theory to analyze strategic s...
This Open Access book, Responsible innovation provides benefits for society, for instance more sustainable products, more engagement with consumers and less anxiety about emerging technologies. As a governance tool it is mostly driven by research funders, including the European Commission, under the term “responsible research and innovation” (RRI). To achieve uptake in private industry is a challenge. This book provides successful case studies for the implementation of responsible innovation in businesses. The importance of social innovations is emphasized as a link between benefits for society and profits for businesses, especially SMEs. For corporate industry it is shown how responsibl...