You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for sto...
The evolution of mobile communication standards presents numerouschallenges in mobile handset design. Designers must continue toturn out handsets that maintain high device performance and airinterface compatibility, while at the same time shrink powerconsumption, form factors, and costs. Mobile Handset Design is uniquely written to equipprofessionals and students with a complete understanding of how amobile phone works, and teaches the skills to design the latestmobile handsets. Das walks readers through mobile phone operatingprinciples, system infrastructure, TDMA-FDMA-CDMA-OFDMA techniques,hardware anatomy, software and protocols, and internal modules,components, and circuits. He presents ...
Smart Environments contains contributions from leading researchers, describing techniques and issues related to developing and living in intelligent environments. Reflecting the multidisciplinary nature of the design of smart environments, the topics covered include the latest research in smart environment philosophical and computational architecture considerations, network protocols for smart environments, intelligent sensor networks and powerline control of devices, and action prediction and identification.
The book focuses on mobile agents, which are computer programs that can autonomously migrate between network sites. This text introduces the concepts and principles of mobile agents, provides an overview of mobile agent technology, and focuses on applications in networking and distributed computing.
Develops foundational concepts, key operational and design principles, and interdisciplinary applications for cyber-physical systems.
A one-stop resource for the use of algorithms and protocols in wireless sensor networks From an established international researcher in the field, this edited volume provides readers with comprehensive coverage of the fundamental algorithms and protocols for wireless sensor networks. It identifies the research that needs to be conducted on a number of levels to design and assess the deployment of wireless sensor networks, and provides an in-depth analysis of the development of the next generation of heterogeneous wireless sensor networks. Divided into nineteen succinct chapters, the book covers: mobility management and resource allocation algorithms; communication models; energy and power co...
This book constitutes the refereed proceedings of the 9th International Conference on Distributed Computing and Networking, ICDCN 2008 - formerly known as IWDC (International Workshop on Distributed Computing) - held in Kolkata, India, in January 2008. The 30 revised full papers and 27 revised short papers presented together with 3 keynote talks and 1 invited lecture were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on agreement protocols, fault tolerance and synchronization, self-stabilization, scheduling, clustering, and data mining, parallel architectures and algorithms, mobile agents and cryptography in the distributed computing track and on sensor networks, internet and security, wireless networks, ad hoc networks, optical networks, QoS and multimedia in the networking track.
The development of computational intelligence (CI) systems was inspired by observable and imitable aspects of intelligent activity of human being and nature. The essence of the systems based on computational intelligence is to process and interpret data of various nature so that that CI is strictly connected with the increase of available data as well as capabilities of their processing, mutually supportive factors. Developed theories of computational intelligence were quickly applied in many fields of engineering, data analysis, forecasting, biomedicine and others. They are used in images and sounds processing and identifying, signals processing, multidimensional data visualization, steerin...
Since the early 1990s, the wireless communications field has witnessed explosive growth. The wide range of applications and existing new technologies nowadays stimulated this enormous growth and encouraged wireless applications. The new wireless networks will support heterogeneous traffic, consisting of voice, video, and data (multimedia). This necessitated looking at new wireless generation technologies and enhance its capabilities. This includes new standards, new levels of Quality of Service (QoS), new sets of protocols and architectures, noise reduction, power control, performance enhancement, link and mobility management, nomadic and wireless networks security, and ad-hoc architectures....
Cognitive radios (CR) technology is capable of sensing its surrounding environment and adapting its internal states by making corresponding changes in certain operating parameters. CR is envisaged to solve the problems of the limited available spectrum and the inefficiency in the spectrum usage. CR has been considered in mobile ad hoc networks (MANETs), which enable wireless devices to dynamically establish networks without necessarily using a fixed infrastructure. The changing spectrum environment and the importance of protecting the transmission of the licensed users of the spectrum mainly differentiate classical MANETs from CR-MANETs. The cognitive capability and re-configurability of CR-...