You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-proceedings of an International NSF Workshop on an Infrastructure for Mobile and Wireless Systems held in Scottsdale, Arizona in October 2001. The 11 revised full papers presented together with 4 invited contributions and a comprehensive consensus report for developing an infrastructure for mobile and wireless systems were carefully selected during two rounds of reviewing and improvement. The book assesses the state of the art in the area and provides a research agenda for future R&D work.
Building Scalable Network Services: Theory and Practice is on building scalable network services on the Internet or in a network service provider's network. The focus is on network services that are provided through the use of a set of servers. The authors present a tiered scalable network service model and evaluate various services within this architecture. The service model simplifies design tasks by implementing only the most basic functionalities at lower tiers where the need for scalability dominates functionality. The book includes a number of theoretical results that are practical and applicable to real networks, such as building network-wide measurement, monitoring services, and strategies for building better P2P networks. Various issues in scalable system design and placement algorithms for service nodes are discussed. Using existing network services as well as potentially new but useful services as examples, the authors formalize the problem of placing service nodes and provide practical solutions for them.
Broadband Satellite Communications for Internet Access is a systems engineering methodology for satellite communication networks. It discusses the implementation of Internet applications that involve network design issues usually addressed in standard organizations. Various protocols for IP- and ATM-based networks are examined and a comparative performance evaluation of different alternatives is described. This methodology can be applied to similar evaluations over any other transport medium.
This volume contains the proceedings from the workshops held in conjunction with the IEEE International Parallel and Distributed Processing Symposium, IPDPS 2000, on 1-5 May 2000 in Cancun, Mexico. The workshopsprovidea forum for bringing together researchers,practiti- ers, and designers from various backgrounds to discuss the state of the art in parallelism.Theyfocusondi erentaspectsofparallelism,fromruntimesystems to formal methods, from optics to irregular problems, from biology to networks of personal computers, from embedded systems to programming environments; the following workshops are represented in this volume: { Workshop on Personal Computer Based Networks of Workstations { Worksh...
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. Biometric devices are now available to capture biometric measurements such as fingerprints, palm, retinal scans, keystroke, voice recognition and facial scanning. However, the accuracy of these measurements varies, which has a direct relevance on the levels of security they offer. With the need to combat the problems related to identify theft and other security issues, society will have to compromise between security and personal freedoms. Securing Biometrics Applications investigates and identifies key impacts of biometric security applications, while discovering opportunities and challenges presented by the biometric technologies available.
A thoroughly up-to-date resource on IEEE 802 wireless standards Readers can turn to this book for complete coverage of the current and emerging IEEE 802 wireless standards/drafts, including: 802.11 Wireless LANs 802.15.1 Bluetooth and 801.15.2 802.15.3 Wireless PANs 802.15.4 and 802.15.5 Wireless PANs 802.16 Wireless MANs Emerging Wireless LANs, Wireless PANs, and Wireless MANs is a unique, convenient resource for engineers, scientists, and researchers in academia and industry. It also serves as a valuable textbook for related courses at the upper-undergraduate and graduate levels.
None
In the last decade, wireless or wired sensor networks have attracted much attention. However, most designs target general sensor network issues including protocol stack (routing, MAC, etc.) and security issues. This book focuses on the close integration of sensing, networking, and smart signal processing via machine learning. Based on their world-class research, the authors present the fundamentals of intelligent sensor networks. They cover sensing and sampling, distributed signal processing, and intelligent signal learning. In addition, they present cutting-edge research results from leading experts.
The database field has experienced a rapid and incessant growth since the development of relational databases. The progress in database systems and applications has produced a diverse landscape of specialized technology areas that have often become the exclusive domain of research specialists. Examples include active databases, temporal databases, object-oriented databases, deductive databases, imprecise reasoning and queries, and multimedia information systems. This book provides a systematic introduction to and an in-depth treatment of these advanced database areas. It supplies practitioners and researchers with authoritative coverage of recent technological advances that are shaping the f...
This volume contains expanded and updated versions of papers presented at CIKM 92, the First International Conference on Information and Knowledge Management, held in Baltimore, Maryland, in November 1992. The conference participants came from the fields of database management, information retrieval, and artificial intelligence. A major theme in the volume is how these fields are merging and enriching each other. Theeight papers discuss: discovering context in a conceptual schema; a system for face information retrieval; queries in OODB systems; consistency checking in OODBs; integrity constraints representation in OODBs; a framework for temporal object databases; inductive dependencies and approximate databases; OODB design methodologies.