You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Command and Control (C2) is the set of organizational and technical attributes and processes by which an enterprise marshals and employs human, physical, and information resources to solve problems and accomplish missions.C2 Re-envisioned: The Future of the Enterprise identifies four interrelated megatrends that are individually and collectively shaping the state of the art and practice of C2 as well as the mission challenges we face. These megatrends the book examines are: Big Problems—manifested in part as increasing complexity of both endeavors and enterprises, as military establishments form coalitions with each other, and partnerships with various civilian agencies and non-governmenta...
The book presents papers delivered by researchers, industrial experts and academicians at the Conference on Emerging Trends in Computing and Communication (ETCC 2014). As such, the book is a collection of recent and innovative works in the field Network Security and Cryptography, Cloud Computing and Big Data Analytics, Data Mining and Data Warehouse, Communication and Nanotechnology and VLSI and Image Processing.
This book constitutes the refereed proceedings of the First International Conference on Digital Image Processing and Pattern Recognition, DPPR 2011, held in Tirunelveli, India, in September 2011. The 48 revised full papers were carefully reviewed and selected from about 400 submissions. The conference brought together leading researchers, engineers and scientists in the domain of Digital Image Processing and Pattern Recognition. The papers cover all theoretical and practical aspects of the field and present new advances and current research results in two tracks, namely: digital image processing and pattern recognition, and computer science, engineering and information technology.
Compared with conventional communications, cooperative communication allows multiple users in a wireless network to coordinate their packet transmissions and share each other's resources, thus achieving high-performance gain and better service coverage and reliability. Energy Efficient Cooperative Wireless Communication and Networks provides a comp
Simulation is a widely used mechanism for validating the theoretical models of networking and communication systems. Although the claims made based on simulations are considered to be reliable, how reliable they really are is best determined with real-world implementation trials. Simulation Technologies in Networking and Communications: Selecting the Best Tool for the Test addresses the spectrum of issues regarding the different mechanisms related to simulation technologies in networking and communications fields. Focusing on the practice of simulation testing instead of the theory, it presents the work of more than 50 experts from around the world. Considers superefficient Monte Carlo simul...
This book constitutes the refereed proceedings of the Third International Conference on Wireless, Mobile Networks and Applications, WiMoA 2011, and the First International Conference on Computer Science, Engineering and Applications, ICCSEA 2011, held in Dubai, United Arab Emirates, in May 2011. The book is organized as a collection of papers from WiMoA 2011 and ICCSEA 2011. The 8 revised full papers presented in the WiMoA 2011 part were carefully reviewed and selected from 63 submissions. The 20 revised full papers presented in the ICCSEA 2011 part were carefully reviewed and selected from 110 submissions.
With nearly 7 billion mobile phone subscriptions worldwide, mobility and computing have become pervasive in our society and business. Moreover, new mobile multimedia communication services are challenging telecommunication operators. To support the significant increase in multimedia traffic—especially video—over wireless networks, new technological infrastructure must be created. Cognitive Radio Networks (CRNs) are widely regarded as one of the most promising technologies for future wireless communications. This book explains how to efficiently deliver video, audio, and other data over CRNs. Covering advanced algorithms, protocols, and hardware-/software-based experiments, this book desc...
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Ano
This book constitutes the proceedings of the 15th IFIP TC8 International Conference on Computer Information Systems and Industrial Management, CISIM 2016, held in Vilnius, Lithuania, in September 2016. The 63 regular papers presented together with 1 inivted paper and 5 keynotes in this volume were carefully reviewed and selected from about 89 submissions. The main topics covered are rough set methods for big data analytics; images, visualization, classification; optimization, tuning; scheduling in manufacturing and other applications; algorithms; decisions; intelligent distributed systems; and biometrics, identification, security.
Compared with other wireless communication technologies, such as Bluetooth, WiFi, and UWB, ZigBee is a far more reliable, affordable, and energy-efficient option. It is also the only global wireless communication standard for easily deployed, low-power consumption products.ZigBee Network Protocols and Applications provides detailed descriptions of