You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Explores issues involved in designing safe, secure and sustainable BANs from a cyber-physical systems perspective, for researchers and graduate students.
In the past few years, secure information sharing became very popular in the area of immigration, military applications, healthcare, education, foreign affairs, etc. As secure communication utilizes both wireless and wired communication mechanizations for exchanging sensitive information, security and privacy of the information exchange cannot be easily compromised. To moderate the security, integrity, authenticity, and privacy issues related to information exchange, numerous authentication mechanisms have been recommended by different researchers in the literature in recent times, but these are vulnerable to prospective security flaws such as masquerade, insider, replay, impersonation, pass...
One of the main goals of the pervasive computing domain is to provide the user with task support for everyday tasks. This task support should be realized by pervasive applications that are seamlessly integrated in the environment, for example embedded into devices such as everyday objects. To automate configuration, context information is shared between these devices. The shared context can contain private information that should not be made public. System support, which helps to develop pervasive applications, should therefore contain mechanisms that utilize security and privacy methods when handling context. Pervasive applications can then use these mechanisms and create pervasive environm...
The huge and growing demand for wireless communication systems has spurred a massive effort on the parts of the computer science and electrical engineering communities to formulate ever-more efficient protocols and algorithms. Written by a respected figure in the field, Handbook of Wireless Networks and Mobile Computing is the first book to cover the subject from a computer scientist's perspective. It provides detailed practical coverage of an array of key topics, including cellular networks, channel assignment, queuing, routing, power optimization, and much more.
There has been a dramatic increase in the utilization of wireless technologies in healthcare systems as a consequence of the wireless ubiquitous and pervasive communications revolution. Emerging information and wireless communication technologies in health and healthcare have led to the creation of e-health systems, also known as e-healthcare, which have been drawing increasing attention in the public and have gained strong support from government agencies and various organizations. E-Healthcare Systems and Wireless Communications: Current and Future Challenges explores the developments and challenges associated with the successful deployment of e-healthcare systems. The book combines research efforts in different disciplines including pervasive wireless communications, wearable computing, context-awareness, sensor data fusion, artificial intelligence, neural networks, expert systems, databases, and security. This work serves as a comprehensive reference for graduate students in bioengineering and also provides solutions for medical researchers who are faced with the challenge of designing and implementing a cost-effective pervasive and ubiquitous wireless communication system.
The availability of cheaper, faster, and more reliable electronic components has stimulated important advances in computing and communication technologies. Theoretical and algorithmic approaches that address key issues in sensor networks, ad hoc wireless networks, and peer-to-peer networks play a central role in the development of emerging network paradigms. Filling the need for a comprehensive reference on recent developments, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks explores two questions: What are the central technical issues in these SAP networks? What are the possible solutions/tools available to address these issues? The edit...
Increasingly, modern medicine relies on so called traditional or ancient medical knowledge. Holistic practices such as adhering to proper diet, observing rules for appropriate behavior, and administering medical preparations are coupled with the latest technology and methods to treat the whole patient. In light of this trend, there is much to be gained from understanding of one of the oldest medical systems still in existence. Tibetan Medicinal Plants provides you a detailed analysis of how Tibetan plants are used in this centuries old system. The book opens with a summary of Tibetan medicine and covers the various habitats in which the plants are found. The main part of this volume encompas...
User-Driven Healthcare: Concepts, Methodologies, Tools, and Applications provides a global discussion on the practice of user-driven learning in healthcare and connected disciplines and its influence on learning through clinical problem solving. This book brings together different perspectives for researchers and practitioners to develop a comprehensive framework of user-driven healthcare.
OPTIMIZED PREDICTIVE MODELS IN HEALTH CARE USING MACHINE LEARNING This book is a comprehensive guide to developing and implementing optimized predictive models in healthcare using machine learning and is a required resource for researchers, healthcare professionals, and students who wish to know more about real-time applications. The book focuses on how humans and computers interact to ever-increasing levels of complexity and simplicity and provides content on the theory of optimized predictive model design, evaluation, and user diversity. Predictive modeling, a field of machine learning, has emerged as a powerful tool in healthcare for identifying high-risk patients, predicting disease prog...
This book constitutes the refereed proceedings of the 13th International Conference on High-Performance Computing, HiPC 2006, held in Bangalore, India in December 2006. The 52 revised full papers presented together with the abstracts of 7 invited talks were carefully reviewed and selected from 335 submissions. The papers are organized in topical sections on scheduling and load balancing, architectures, network and distributed algorithms, application software, network services, applications, ad-hoc networks, systems software, sensor networks and performance evaluation, as well as routing and data management algorithms.