You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Bringing together market research reports, business analyst briefings, and technology references into one comprehensive volume, Business Intelligence for Telecommunications identifies those advances in both methods and technology that are being employed to inform decision-making and give companies an edge in the rapidly growing and highly co
The traditionally separate Fixed, Mobile, and Internet sectors have been evolving recently toward a single sector, offering numerous implications for those involved in technology and business. It is therefore essential for telecommunication professionals to get a keen grasp of where the industry is heading. Providing a solid foundation in the industry, Introduction to Mobile Communications: Technology, Services, Markets explores the core requirements of modern mobile telecommunications-from markets to technology. It explains how wireless systems work, how mobility is supported, the underlying infrastructure, and what interactions are needed among the different functional components. The book...
This book constitutes the proceedings of the 23rd International Conference on Text, Speech, and Dialogue, TSD 2020, held in Brno, Czech Republic, in September 2020.* The 54 full papers presented in this volume were carefully reviewed and selected from 110 submissions. They were organized in topical sections named text, speech, and dialogue. The book also contains 3 invited talks. * The conference was held virtually due to the COVID-19 pandemic.
The implementation of IPv6 is essential to the continued growth of the Internet and the development of new applications. The Handbook of IPv4 to IPv6 Transition Methodologies provides a wealth of best practices and procedures that will help corporations plan and implement a smooth transition to IPv6.A blueprint for successful transition, the Handbo
This book constitutes the thoroughly refereed post-proceedings of the Second International Service Availability Symposium, ISAS 2005, held in Berlin, Germany in April 2005. The 15 revised full papers presented together with a keynote talk were carefully selected for inclusion in the book. The papers are organized in topical sections on data and computation availability, specifying, modeling and verifying service availability, high-availability by service-oriented architectures, modeling and composition, and verification and availability assessment.
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.
The concept of aware systems is among the most exciting trends in computing today, fueled by recent developments in pervasive computing, including new computers worn by users, embedded devices, smart appliances, sensors, and varieties of wireless networking technology. Context-Aware Pervasive Systems: The Architecture of a New Breed of Applications introduces a diverse set of application areas and provides blueprints for building context-aware behavior into applications. Reviewing the anatomy of context-aware pervasive applications, this resource covers abstract architecture. It examines mobile services, appliances, smart devices, software agents, electronic communication, sensor networks, s...
A promising new technology, wireless mesh networks are playing an increasingly important role in the future generations of wireless mobile networks. Characterized by dynamic self-organization, self-configuration, and self-healing to enable quick deployment, easy maintenance, low cost, high scalability, and reliable services, this technology is beco
As Internet traffic continues to grow exponentially, there is a great need to build Internet protocol (IP) routers with high-speed and high-capacity packet networking capabilities. The first book to explore this subject, Packet Forwarding Technologies explains in depth packet forwarding concepts and implementation technologies. It covers the