You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the IFIP-TC6 International Conference on Personal Wireless Communications, PWC 2004, held in Delft, Netherlands in September 2004. The 25 revised full papers and 13 revised short papers presented were carefully reviewed and selected from 100 submissions. Among the topics addressed are all current aspects of personal wireless communications, in particular IPv6, MIPv6, self-organization, network mobility, personal area networks, PAN, QoS, ad-hoc networks, 802.11 networking, wireless sensor networks, ad-hoc sensor networks, W-CDMA networks, UMTS, network performance, network security, and mobile IPv6.
This book focuses on the needs of railway operators in terms of wireless communications, divided in two main categories: the commercial services and the operational needs. Then, all available technologies that can be used to provide Internet access on board trains and all the other operational applications requiring high capacity are detailed. Finally, challenges and trends in railway telecommunications are highlighted, through the presentation of the future and emerging technologies, the current discussions and works in the different authorities, and the key challenges and scientific barriers.
Amiya Chakravarty is a big name in production manufacturing and Josh Eliashberg is a huge name in marketing. This is one of the first books that examines the interface of Marketing and Production, with the chapters written by well-known people in the field. Hardcover version published in December 2003.
This book constitutes the refereed proceedings of the Second International Working Conference on Active Networks, IWAN 200, held in Tokyo, Japan in October 2000. The 30 revised full papers presented were carefully reviewed and selected from numerous submissions. The book offers topical sections on architecture, multicast, quality of service (QoS), applications, management, service architecture, and mobile IP.
The objective of GCN 2011 is to facilitate an exchange of information on best practices for the latest research advances in the area of green communications and networks, which mainly includes the intelligent control, or efficient management, or optimal design of access network infrastructures, home networks, terminal equipment, and etc. Topics of interests include network design methodology, enabling technologies, network components and devices, applications, others and emerging new topics.
This book provides comprehensive coverage of the latest trends/advances in subjective and objective quality evaluation for traditional visual signals, such as 2D images and video, as well as the most recent challenges for the field of multimedia quality assessment and processing, such as mobile video and social media. Readers will learn how to ensure the highest storage/delivery/ transmission quality of visual content (including image, video, graphics, animation, etc.) from the server to the consumer, under resource constraints, such as computation, bandwidth, storage space, battery life, etc.
With the rapid growth of the Internet as well as the increasing demand for broadband services, access networks have been receiving growing investments in recent years. This has led to a massive network deployment with the goal of eliminating the ba- width bottleneck between end-users and the network core. Today many diverse te- nologies are being used to provide broadband access to end users. The architecture and performance of the access segment (local loop, wired and wireless access n- works, and even home networks) are getting increasing attention for ensuring quality of service of diverse broadband applications. Moreover, most access lines will no longer terminate on a single device, thu...
Addresses the need for peer-to-peer computing and grid paradigms in delivering efficient service-oriented computing.
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and t...
This book constitutes the proceedings of the 6th International ICST Conference, TridentCom 2010, held in Berlin, Germany, in May 2010. Out of more than 100 submitted contributions the Program Committee finally selected 15 full papers, 26 practices papers, and 22 posters. They focus on topics as Internet testbeds, future Internet research, wireless sensors, media and mobility, and monitoring in large scale testbeds.