You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
How does the internet really work? This book explains the technology behind it all, in simple question and answer format.
This book constitutes the refereed proceedings of the 16th International Conference on Passive and Active Measurement, PAM 2015, held in New York, NY, USA, in March 2015. The 27 full papers presented were carefully reviewed and selected from 100 submissions. The papers have been organized in the following topical sections: DNS and Routing, Mobile and Cellular, IPv6, Internet-Wide, Web and Peer-to-Peer, Wireless and Embedded, and Software Defined Networking.
Cloud Services, Networking and Management provides a comprehensive overview of the cloud infrastructure and services, as well as their underlying management mechanisms, including data center virtualization and networking, cloud security and reliability, big data analytics, scientific and commercial applications. Special features of the book include: State-of-the-art content Self-contained chapters for readers with specific interests Includes commercial applications on Cloud (video services and games)
No single solution applied at one particular layer can help applications solve all performance-related issues with communication services. Instead, this book shows that a coordinated effort is needed among the layers. It covers many different types of technologies and layers across the stack, from the architectural features of the hardware, through the protocols and their implementation in operating system kernels, to the manner in which application services and middleware are using underlying platforms. The book also describes key developments in high-end platforms, high performance interconnection fabrics and communication libraries, and multi- and many-core systems.
This book discusses the fundamentals of RFID and the state-of-the-art research results in signal processing for RFID, including MIMO, blind source separation, anti-collision, localization, covert RFID and chipless RFID. Aimed at graduate students as well as academic and professional researchers/engineers in RFID technology, it enables readers to become conversant with the latest theory and applications of signal processing for RFID. Key Features: Provides a systematic and comprehensive insight into the application of modern signal processing techniques for RFID systems Discusses the operating principles, channel models of RFID, RFID protocols and analog/digital filter design for RFID Explores RFID-oriented modulation schemes and their performance Highlights research fields such as MIMO for RFID, blind signal processing for RFID, anti-collision of multiple RFID tags, localization with RFID, covert RFID and chipless RFID Contains tables, illustrations and design examples
This book contains a collection of the papers accepted by the CENet2020 – the 10th International Conference on Computer Engineering and Networks held on October 16-18, 2020 in Xi’an, China. The topics focus but are not limited to Internet of Things and Smart Systems, Artificial Intelligence and Applications, Communication System Detection, Analysis and Application, and Medical Engineering and Information Systems. Each part can be used as an excellent reference by industry practitioners, university faculties, research fellows and undergraduates as well as graduate students who need to build a knowledge base of the most current advances and state-of-practice in the topics covered by this conference proceedings. This will enable them to produce, maintain, and manage systems with high levels of trustworthiness and complexity.
The book examines how Fog will change the information technology industry in the next decade. Fog distributes the services of computation, communication, control and storage closer to the edge, access and users. As a computing and networking architecture, Fog enables key applications in wireless 5G, the Internet of Things, and big data. The authors cover the fundamental tradeoffs to major applications of fog. The book chapters are designed to motivate a transition from the current cloud architectures to the Fog (Chapter 1), and the necessary architectural components to support such a transition (Chapters 2-6). The rest of the book (Chapters 7-xxx) are dedicated to reviewing the various 5G an...
This is an open access book. The 2nd International Conference on Business Administration and Data Science (BADS 2022) is hosted by Kashi University and organized by the College of Economics and Management of Kashi University. The 2nd International Conference on Business Administration and Data Science (BADS 2022) is one of the series of activities for the 60th anniversary of the founding of Kashgar University In the current situation of rapid economic development, the competition in the market is increasingly fierce. The drawbacks of traditional enterprise management and the backward management concept have seriously hindered the normal development of enterprises. In order to improve their competitive advantages and market share, enterprises must optimize their management methods and build a modern business administration system. In this situation, enterprises can only promote their development process by improving their business management mode and formulating scientific business management policies.
The 39-volume set, comprising the LNCS books 13661 until 13699, constitutes the refereed proceedings of the 17th European Conference on Computer Vision, ECCV 2022, held in Tel Aviv, Israel, during October 23–27, 2022. The 1645 papers presented in these proceedings were carefully reviewed and selected from a total of 5804 submissions. The papers deal with topics such as computer vision; machine learning; deep neural networks; reinforcement learning; object recognition; image classification; image processing; object detection; semantic segmentation; human pose estimation; 3d reconstruction; stereo vision; computational photography; neural networks; image coding; image reconstruction; object recognition; motion estimation.
CSMA-based wireless mesh networks are vulnerable to collisions. Even a single unicast flow can exhibit excessive collisions from hidden terminals. Furthermore, fairness objectives for single-hop networks can cause undesirable behaviors for mesh networks. Mesh networks of wireless sensors suffer from undesirable protocol interactions due to these challenges. Inter-protocol collisions and unfair channel usage between protocols cause the behavior of one protocol to change depending on other protocols. These inter-protocol interactions complicate the design of large sensor network systems. Motivated by these problems, this dissertation presents grant-to-send, a novel collision avoidance mechanis...