You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book represents the thoroughly refereed post-proceedings of the 6th International Workshop on Agent-Oriented Software Engineering, AOSE 2005. The 18 revised full papers were carefully selected from 35 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on modeling tools, analysis and validation tools, multiagent systems design, implementation tools, and experiences and comparative evaluations.
Driven by a combination of technological improvements and commercial pressure, interest in IPTV services has increasingly grown. IPTV refers to the use of the Internet protocol required for delivery of television content. IPTV represents an emerging technology that could change the manner in which homes receive entertainment, personal computers ope
This book constitutes the refereed joint proceedings of six internationl workshops held in conjunction with the 23rd International Conference on Conceptual Modeling, ER 2004, in Shanghai, China in November 2004. The 56 revised full papers presented were carefully reviewed and selected from 163 submissions. The papers are organized in topical sections on geographical conceptual modeling; spatial storage, indexing, and data consistency; spatial representation and spatial services; spatial queries and retrieval, Web information integration; Web information mining; conceptual models for Web information; Web information systems and Webservices; systems evolution support in conceptual modeling; temporal and evolution aspects in Internat-based information systems; schema evolution and versioning in data management; conceptual modeling of agents; agents applications; digital government systems; digital government technologies; e-business systems requirements engineering; and e-business processes and infrastructure.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous submissions. They cover a wide range of topics such as localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition. The proceedings also include papers from the best paper session and the industry track, as well as poster and demo papers.
Analyze Key Security Mechanisms and Approaches with this practical primer, the first book on the market to cover critical IPv6 security considerations.Dan Minoli, author of over 50 books on telecommunications and networks, and Jake Kouns, Chairman, CEO and CFO of the Open Security Foundation, discuss IPv6 security vulnerabilities, considerations, a
This book constitutes revised papers from the Second International Conference on Urban Intelligence and Applications, ICUIA 2020, held in August 2020. Due to the COVID-19 pandemic the conference was held online. The 26 papers were thoroughly reviewed and selected from 122 submissions. They are organised in the topical sections on technology and infrastructure; community and wellbeing; mobility and transportation; security, safety, and emergency management.
"This book addresses technical challenges, design frameworks, and development experiences that integrate multiple mobile devices into a single multiplatform e-learning systems"--Provided by publisher.
Service-oriented architecture (SOA) uses services as the baseline for developing new architectures and applications, as networks are built specifically to satisfy service requirements. Most services are currently handled over different networks, but newer services will soon require cross-network support. Architecting the Telecommunication Evolution
IP Multimedia Subsystem (IMS) technology, which merges the Internet with interactive telecommunications, represents the here and now for today's packet-switched networks. Consequently, anyone working with or around these converging fields needs to possess a fundamental understanding of IMS and how this technology is poised to change the way new app
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.