30 results on '"Professions"'
Search Results
2. Computational Science and Its Applications – ICCSA 2018 : 18th International Conference, Melbourne, VIC, Australia, July 2–5, 2018, Proceedings, Part IV
- Author
-
Osvaldo Gervasi, Beniamino Murgante, Sanjay Misra, Elena Stankova, Carmelo M. Torre, Ana Maria A.C. Rocha, David Taniar, Bernady O. Apduhan, Eufemia Tarantino, Yeonseung Ryu, Osvaldo Gervasi, Beniamino Murgante, Sanjay Misra, Elena Stankova, Carmelo M. Torre, Ana Maria A.C. Rocha, David Taniar, Bernady O. Apduhan, Eufemia Tarantino, and Yeonseung Ryu
- Subjects
- Computer networks, Software engineering, Application software, Artificial intelligence, Computer vision, Computers, Professions
- Abstract
The five volume set LNCS 10960 until 10964 constitutes the refereed proceedings of the 18th International Conference on Computational Science and Its Applications, ICCSA 2018, held in Melbourne, Australia, in July 2018. Apart from the general tracks, ICCSA 2018 also includes 34 international workshops in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as computer graphics and virtual reality.
- Published
- 2018
3. Computational Science and Its Applications – ICCSA 2018 : 18th International Conference, Melbourne, VIC, Australia, July 2-5, 2018, Proceedings, Part V
- Author
-
Osvaldo Gervasi, Beniamino Murgante, Sanjay Misra, Elena Stankova, Carmelo M. Torre, Ana Maria A.C. Rocha, David Taniar, Bernady O. Apduhan, Eufemia Tarantino, Yeonseung Ryu, Osvaldo Gervasi, Beniamino Murgante, Sanjay Misra, Elena Stankova, Carmelo M. Torre, Ana Maria A.C. Rocha, David Taniar, Bernady O. Apduhan, Eufemia Tarantino, and Yeonseung Ryu
- Subjects
- Computer networks, Software engineering, Application software, Artificial intelligence, Computer vision, Computers, Professions
- Abstract
The five volume set LNCS 10960 until 10964 constitutes the refereed proceedings of the 18th International Conference on Computational Science and Its Applications, ICCSA 2018, held in Melbourne, Australia, in July 2018. Apart from the general tracks, ICCSA 2018 also includes 34 international workshops in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as computer graphics and virtual reality. The total of 265 full papers and 10 short papers presented in the 5-volume proceedings set of ICCSA 2018, were carefully reviewed and selected from 892 submissions.The paper Nitrogen Gas on Graphene: Pairwise Interaction Potentials is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
- Published
- 2018
4. Computational Science and Its Applications – ICCSA 2018 : 18th International Conference, Melbourne, VIC, Australia, July 2–5, 2018, Proceedings, Part III
- Author
-
Osvaldo Gervasi, Beniamino Murgante, Sanjay Misra, Elena Stankova, Carmelo M. Torre, Ana Maria A.C. Rocha, David Taniar, Bernady O. Apduhan, Eufemia Tarantino, Yeonseung Ryu, Osvaldo Gervasi, Beniamino Murgante, Sanjay Misra, Elena Stankova, Carmelo M. Torre, Ana Maria A.C. Rocha, David Taniar, Bernady O. Apduhan, Eufemia Tarantino, and Yeonseung Ryu
- Subjects
- Computer networks, Software engineering, Application software, Artificial intelligence, Computer vision, Computers, Professions
- Abstract
The five volume set LNCS 10960 until 10964 constitutes the refereed proceedings of the 18th International Conference on Computational Science and Its Applications, ICCSA 2018, held in Melbourne, Australia, in July 2018.Apart from the general tracks, ICCSA 2018 also includes 34 international workshops in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as computer graphics and virtual reality.The total of 265 full papers and 10 short papers presented in the 5-volume proceedings set of ICCSA 2018, were carefully reviewed and selected from 892 submissions.
- Published
- 2018
5. Computational Science and Its Applications – ICCSA 2018 : 18th International Conference, Melbourne, VIC, Australia, July 2-5, 2018, Proceedings, Part II
- Author
-
Osvaldo Gervasi, Beniamino Murgante, Sanjay Misra, Elena Stankova, Carmelo M. Torre, Ana Maria A.C. Rocha, David Taniar, Bernady O. Apduhan, Eufemia Tarantino, Yeonseung Ryu, Osvaldo Gervasi, Beniamino Murgante, Sanjay Misra, Elena Stankova, Carmelo M. Torre, Ana Maria A.C. Rocha, David Taniar, Bernady O. Apduhan, Eufemia Tarantino, and Yeonseung Ryu
- Subjects
- Computer networks, Software engineering, Application software, Artificial intelligence, Computer vision, Computers, Professions
- Abstract
The five volume set LNCS 10960 until 10964 constitutes the refereed proceedings of the 18th International Conference on Computational Science and Its Applications, ICCSA 2018, held in Melbourne, Australia, in July 2018. Apart from the general tracks, ICCSA 2018 also includes 34 international workshops in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as computer graphics and virtual reality. The total of 265 full papers and 10 short papers presented in the 5-volume proceedings set of ICCSA 2018, were carefully reviewed and selected from 892 submissions.
- Published
- 2018
6. Computational Science and Its Applications – ICCSA 2018 : 18th International Conference, Melbourne, VIC, Australia, July 2-5, 2018, Proceedings, Part I
- Author
-
Osvaldo Gervasi, Beniamino Murgante, Sanjay Misra, Elena Stankova, Carmelo M. Torre, Ana Maria A.C. Rocha, David Taniar, Bernady O. Apduhan, Eufemia Tarantino, Yeonseung Ryu, Osvaldo Gervasi, Beniamino Murgante, Sanjay Misra, Elena Stankova, Carmelo M. Torre, Ana Maria A.C. Rocha, David Taniar, Bernady O. Apduhan, Eufemia Tarantino, and Yeonseung Ryu
- Subjects
- Computer networks, Software engineering, Application software, Artificial intelligence, Computer vision, Computers, Professions
- Abstract
The five volume set LNCS 10960 until 10964 constitutes the refereed proceedings of the 18th International Conference on Computational Science and Its Applications, ICCSA 2018, held in Melbourne, Australia, in July 2018. Apart from the general tracks, ICCSA 2018 also includes 34 international workshops in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as computer graphics and virtual reality. The total of 265 full papers and 10 short papers presented in the 5-volume proceedings set of ICCSA 2018, were carefully reviewed and selected from 892 submissions.
- Published
- 2018
7. Product-Focused Software Process Improvement : 18th International Conference, PROFES 2017, Innsbruck, Austria, November 29–December 1, 2017, Proceedings
- Author
-
Michael Felderer, Daniel Méndez Fernández, Burak Turhan, Marcos Kalinowski, Federica Sarro, Dietmar Winkler, Michael Felderer, Daniel Méndez Fernández, Burak Turhan, Marcos Kalinowski, Federica Sarro, and Dietmar Winkler
- Subjects
- Software engineering, Electronic data processing—Management, Computers, Professions, Electronic digital computers—Evaluation, Computer networks
- Abstract
This book constitutes the refereed proceedings of the 18th International Conference on Product-Focused Software Process Improvement, PROFES 2017, held in Innsbruck, Austria, in November/December 2017. The 17 revised full papers presented together with 10 short papers, 21 workshop papers. 3 posters and tool demonstrations papers, and 4 tutorials were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on : Agile software Development; Data science and analytics; Software engineering processes and frameworks; Industry relevant qualitative research; User and value centric approaches; Software startups; Serum; Software testing.
- Published
- 2017
8. Ad Hoc Wireless Networking
- Author
-
Xiuzhen Cheng, Xiao Huang, Ding-Zhu Du, Xiuzhen Cheng, Xiao Huang, and Ding-Zhu Du
- Subjects
- Computers, Professions, Computer networks, Algorithms, Computer-aided engineering, Electronic data processing—Management
- Abstract
Wireless networking enables two or more computers to communicate using standard network protocols without network cables. Since their emergence in the 1970s, wireless networks have become increasingly pop ular in the computing industry. In the past decade, wireless networks have enabled true mobility. There are currently two versions of mobile wireless networks. An infrastructure network contains a wired backbone with the last hop being wireless. The cellular phone system is an exam ple of an infrastructure network. A multihop ad hoc wireless network has no infrastructure and is thus entirely wireless. A wireless sensor network is an example of a multihop ad hoc wireless network. Ad hoc wireless networking is a technique to support robust and ef ficient operation in mobile wireless networks by incorporating routing functionality into mobile hosts. This technique will be used to realize the dream of'anywhere and anytime computing', which is termed mo bile computing. Mobile computing is a new paradigm of computing in which users carrying portable devices have access to shared infrastruc ture in any location at any time. Mobile computing is a very challenging topic for scientists in computer science and electrical engineering. The representative system for ad hoc wireless networking is called MANET, an acronym for'Mobile Ad hoc NETworks'. MANET is an autonomous system consisting of mobile hosts connected by wireless links which can be quickly deployed.
- Published
- 2013
9. Integrated Network Management VIII : Managing It All
- Author
-
Germán Goldszmidt, Schönwälder Jürgen, Germán Goldszmidt, and Schönwälder Jürgen
- Subjects
- Computer networks, Computer engineering, Electrical engineering, Microprocessors, Computer architecture, Computers, Professions, Electronic data processing—Management
- Abstract
Welcome to 1M 2003, the eighth in a series of the premier international technical conference in this field. As IT management has become mission critical to the economies of the developed world, our technical program has grown in relevance, strength and quality. Over the next few years, leading IT organizations will gradually move from identifying infrastructure problems to providing business services via automated, intelligent management systems. To be successful, these future management systems must provide global scalability, for instance, to support Grid computing and large numbers of pervasive devices. In Grid environments, organizations can pool desktops and servers, dynamically creating a virtual environment with huge processing power, and new management challenges. As the number, type, and criticality of devices connected to the Internet grows, new innovative solutions are required to address this unprecedented scale and management complexity. The growing penetration of technologies, such as WLANs, introduces new management challenges, particularly for performance and security. Management systems must also support the management of business processes and their supporting technology infrastructure as integrated entities. They will need to significantly reduce the amount of adventitious, bootless data thrown at consoles, delivering instead a cogent view of the system state, while leaving the handling of lower level events to self-managed, multifarious systems and devices. There is a new emphasis on'autonomic'computing, building systems that can perform routine tasks without administrator intervention and take prescient actions to rapidly recover from potential software or hardware failures.
- Published
- 2013
10. Testing of Communicating Systems XIV : Application to Internet Technologies and Services
- Author
-
Ina Schieferdecker, Hartmut König, Adam Wolisz, Ina Schieferdecker, Hartmut König, and Adam Wolisz
- Subjects
- Telecommunication, Computer networks, Electrical engineering, Computers, Professions, Microprocessors, Computer architecture, Multimedia systems
- Abstract
Testing of Communicating Systems XIV presents the latest international results in both the theory and industrial practice of the testing of communicating systems, ranging from tools and techniques for testing to test standards, frameworks, notations, algorithms, fundamentals of testing, and industrial experiences and issues. The tools and techniques discussed apply to conformance testing, interoperability testing, performance testing, Internet protocols and applications, and multimedia and distributed systems in general.
- Published
- 2013
11. Certification and Security in E-Services : From E-Government to E-Business
- Author
-
Enrico Nardelli, Sabina Posadziejewski, Maurizio Talamo, Enrico Nardelli, Sabina Posadziejewski, and Maurizio Talamo
- Subjects
- Education—Data processing, Computer science, Electronic commerce, Computer networks, Electronic data processing—Management, Computers, Professions
- Abstract
This volume contains the final proceedings of the special stream on security in E-government and E-business. This stream has been an integral part of the IFIP World Computer Congress 2002, that has taken place from 26-29 August 2002 in Montreal, Canada. The stream consisted of three events: one tutorial and two workshops. The tutorial was devoted to the theme'An Architecture for Information Se curity Management', and was presented by Prof. Dr. Basie von Solms (Past chairman of IFIP TC 11) and Prof. Dr. Jan Eloff (Past chairman of IFIP TC 11 WG 11.2). Both are from Rand Afrikaans University -Standard Bank Academy for Information Technology, Johannesburg, South Africa. The main purpose of the tutorial was to present and discuss an Architecture for Informa tion Security Management and was specifically of value for people involved in, or who wanted to find out more about the management of information secu rity in a company. It provided a reference framework covering all three of the relevant levels or dimensions of Information Security Management. The theme of the first workshop was'E-Government and Security'and was chaired by Leon Strous, CISA (De Nederlandsche Bank NY, The Netherlands and chairman of IFIP TC 11) and by Sabina Posadziejewski, I.S.P., MBA (Al berta Innovation and Science, Edmonton, Canada).
- Published
- 2013
12. Telecommunications Network Design and Management
- Author
-
G. Anandalingam, S. Raghavan, G. Anandalingam, and S. Raghavan
- Subjects
- Business information services, Operations research, Computer networks, Computers, Professions, Application software
- Abstract
Telecommunications Network Design And Management represents the state-of-the-art of applying operations research techniques and solutions across a broad spectrum of telecommunications problems and implementation issues. -The first three chapters of the book deal with the design of wireless networks, including UMTS and Ad-Hoc networks. -Chapters 4-6 deal with the optimal design of telecommunications networks. Techniques used for network design range from genetic algorithms to combinatorial optimization heuristics. -Chapters 7-10 analyze traffic flow in telecommunications networks, focusing on optimizing traffic load distribution and the scheduling of switches under multi-media streams and heavy traffic. -Chapters 11-14 deal with telecommunications network management, examining bandwidth provisioning, admission control, queue management, dynamic routing, and feedback regulation in order to ensure that the network performance is optimized. -Chapters 15-16 deal with the construction of topologies and allocation of bandwidth to ensure quality-of-service.
- Published
- 2013
13. Internet Protocols : Advances, Technologies and Applications
- Author
-
Subrata Goswami and Subrata Goswami
- Subjects
- Computer networks, Electrical engineering, Computers, Professions
- Abstract
Internet Protocols (IP) covers many of the newer internet technologies being developed and explores how they are being implemented in the real world. The author examines numerous implementation details related to IP equipment and software. The material is organized by applications so that readers can better understand the uses of IP technology. Included are details of implementation issues as well as several state-of-the-art equipment and software. Unique features include coverage of: -VPN's, IKE, Mobile IP, 802.11b, 802.1x, 3G, Bluetooth, Zero-Conf, SLP, AAA, iFCP, SCTP, GSM, GPRS, CDMA2000, IPv6, DNSv6, MPLS and more. -Actual implementation strategies for routers through descriptions of Cisco 12410 GSR and Juniper M160. -IP software stack details are also included for several popular operating systems such as Windows, BSD, VxWorks and Linux.
- Published
- 2012
14. Secure Broadcast Communication : In Wired and Wireless Networks
- Author
-
Adrian Perrig, J.D. Tygar, Adrian Perrig, and J.D. Tygar
- Subjects
- Cryptography, Data encryption (Computer science), Computer science, Computer networks, Data structures (Computer science), Information theory, Computers, Professions, Electrical engineering
- Abstract
Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: •key distribution for access control, •source authentication of transmissions, and •non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.
- Published
- 2012
15. Internetworking and Computing Over Satellite Networks
- Author
-
Yongguang Zhang and Yongguang Zhang
- Subjects
- Telecommunication, Computer networks, Electrical engineering, Microprocessors, Computer architecture, Computers, Professions
- Abstract
Communications via satellite introduces a number of new technical problems for mobile networks and applications. Satellite links have fundamentally different properties from terrestrial wired or wireless networks. Some of the properties include larger latency, bursty error characteristics, asymmetric capability, and unconventional network architecture. These differences have far-reaching effects on many satellite communication issues. Internetworking and Computing over Satellite Networks's emphasis is on data networking, internetworking and distributed computing issues. The material surveys recent work in the area of satellite networks, introduces certain state-of-the-art technologies, and presents recent research results in these areas. A variety of issues involving applications, network architecture, medium access controls, multicast routing, asymmetric routing, transport protocols, TCP performance enhancement techniques, data broadcast, and information disseminations, are addressed. This is one of the first books to be focused on the internetworking and computing aspect of satellite networks.
- Published
- 2012
16. Conductor: Distributed Adaptation for Heterogeneous Networks
- Author
-
Mark D. Yarvis, Peter Reiher, Gerald J. Popek, Mark D. Yarvis, Peter Reiher, and Gerald J. Popek
- Subjects
- Microprocessors, Computer architecture, Computers, Professions, Computer science, Computer networks
- Abstract
Internet heterogeneity is driving a new challenge in application development: adaptive software. Together with the increased Internet capacity and new access technologies, network congestion and the use of older technologies, wireless access, and peer-to-peer networking are increasing the heterogeneity of the Internet. Applications should provide gracefully degraded levels of service when network conditions are poor, and enhanced services when network conditions exceed expectations. Existing adaptive technologies, which are primarily end-to-end or proxy-based and often focus on a single deficient link, can perform poorly in heterogeneous networks. Instead, heterogeneous networks frequently require multiple, coordinated, and distributed remedial actions. Conductor: Distributed Adaptation for Heterogeneous Networks describes a new approach to graceful degradation in the face of network heterogeneity - distributed adaptation - in which adaptive code is deployed at multiple points within a network. The feasibility of this approach is demonstrated by conductor, a middleware framework that enables distributed adaptation of connection-oriented, application-level protocols. By adapting protocols, conductor provides application-transparent adaptation, supporting both existing applications and applications designed with adaptation in mind. Conductor: Distributed Adaptation for Heterogeneous Networks introduces new techniques that enable distributed adaptation, making it automatic, reliable, and secure. In particular, we introduce the notion of semantic segmentation, which maintains exactly-once delivery of the semantic elements of a data stream while allowing the stream to be arbitrarily adapted in transit. We also introduce a secure architecture for automatic adaptor selection, protecting user data from unauthorized adaptation. These techniques are described both in the context of conductor and in the broader context of distributed systems. Finally, this book presents empirical evidence from several case studies indicating that distributed adaptation can allow applications to degrade gracefully in heterogeneous networks, providing a higher quality of service to users than other adaptive techniques. Further, experimental results indicate that the proposed techniques can be employed without excessive cost. Thus, distributed adaptation is both practical and beneficial. Conductor: Distributed Adaptation for Heterogeneous Networks is designed to meet the needs of a professional audience composed of researchers and practitioners in industry and graduate-level students in computer science.
- Published
- 2012
17. Localized Quality of Service Routing for the Internet
- Author
-
Srihari Nelakuditi, Zhi-Li Zhang, Srihari Nelakuditi, and Zhi-Li Zhang
- Subjects
- Computer networks, Computer science, Computers, Professions, Microprocessors, Computer architecture, Electrical engineering, Mathematical optimization, Calculus of variations
- Abstract
The exponential growth of Internet brings to focus the need to control such large scale networks so that they appear as coherent, almost intelligent, organ isms. It is a challenge to regulate such a complex network of heterogeneous elements with dynamically changing traffic conditions. To make such a sys tem reliable and manageable, the decision making should be decentralized. It is desirable to find simple local rules and strategies that can produce coherent and purposeful global behavior. Furthermore, these control mechanisms must be adaptive to effectively respond to continually varying network conditions. Such adaptive, distributed, localized mechanisms would provide a scalable so lution for controlling large networks. The need for such schemes arises in a variety of settings. In this monograph, we focus on localized approach to quality of service routing. Routing in the current Internet focuses primarily on connectivity and typi cally supports only the'best-effort'datagram service. The routing protocols deployed such as OSPF use the shortest path only routing paradigm, where routing is optimized for a single metric such as hop count or administrative weight. While these protocols are well suited for traditional data applications such as ftp and telnet, they are not adequate for many emerging applications such as IP telephony, video on demand and teleconferencing, which require stringent delay and bandwidth guarantees. The'shortest paths'chosen for the'best effort'service may not have sufficient resources to provide the requisite service for these applications.
- Published
- 2012
18. Mastering E-Business Infrastructure
- Author
-
Veljko Milutinovic, Frédéric Patricelli, Veljko Milutinovic, and Frédéric Patricelli
- Subjects
- Electronic commerce, Computer science, Computer networks, Computers, Professions, Electronic data processing—Management, Multimedia systems
- Abstract
As a foreword, here we publish an email letter of Late Professor Herb Simon, Nobel Laureate, that he wrote on the occasion ofthe death of the fatherofa friend. This letterofcondolence, more than any other wisdom, tells about the essence of the process of scientific creation, which is so important for both, the specific subject being covered by this book, and for the general science. When asked to address an SSGRR conference in Italy, prior to his death, Professor Herb Simon agreed that these lines be presented to all those who are interested in understanding the real essence oftheir own scientific struggle. Dear Professor Milutinovic: I want to extend my deepest sympathy to you and your family on the death of your father. His career was a very distinguished one, and his life spanned a most complex and difficult sequence of epochs in your country's history. Our generation (I am just a year younger than he was), like all its predecessors, leaves many tasks - hopefully no more than it inherited - for the next generation to take up; but even knowing that it must be so does not remove one's senseofloss in the parting.
- Published
- 2012
19. Distributed Infrastructure Support for Electronic Commerce Applications
- Author
-
Hans-Arno Jacobsen and Hans-Arno Jacobsen
- Subjects
- Software engineering, Microprocessors, Computer architecture, Computers, Professions, Electronic commerce, Computer networks
- Abstract
Distributed Infrastructure Support For E-Commerce And Distributed Applications is organized in three parts. The first part constitutes an overview, a more detailed motivation of the problem context, and a tutorial-like introduction to middleware systems. The second part is comprised of a set of chapters that study solutions to leverage the trade-off between a transparent programming model and application-level enabled resource control. The third part of this book presents three detailed distributed application case studies and demonstrates how standard middleware platforms fail to adequately cope with resource control needs of the application designer in these three cases: -An electronic commerce framework for software leasing over the World Wide Web; -A remote building energy management system that has been experimentally deployed on several building sites; -A wireless computing infrastructure for efficient data transfer to non-stationary mobile clients that have been experimentally validated.
- Published
- 2012
20. Mobile and Wireless Internet : Protocols, Algorithms and Systems
- Author
-
Kia Makki, Niki Pissinou, S. Kami Makki, E.K. Park, Kia Makki, Niki Pissinou, S. Kami Makki, and E.K. Park
- Subjects
- Computer science, Computer networks, Electrical engineering, Computers, Professions
- Abstract
Recent advances in mobile and wireless communication and personal computer technology have created a new paradigm for information processing. Today, mobile and wireless communications exit in many forms, providing different types of services. Existing forms of mobile and wireless communications continue to experience rapid growth and new applications and approaches are being spawned at an increasing rate. Recently, the mobile and wireless Internet has become one of the most important issues in the telecommunications arena. The development of the mobile and wireless Internet is the evolution of several different technologies coming together to make the Internet more accessible. Technologies such as the Internet, wireless networks, and mobile computing have merged to form the mobile and wireless Internet. The mobile and wireless Internet extends traditional Internet and World Wide Web services to wireless devices such as cellular phones, Personal Digital Assistants (PDAs) and notebooks. Mobile and wireless Internet c:an give users access to personalized information anytime and anywhere they need it, and thus empower them to make decisions more quickly, and bring them closer to friends, family, and work colleagues. Wireless data communication methods have been around for sometime.
- Published
- 2012
21. Building Scalable Network Services : Theory and Practice
- Author
-
Cheng Jin, Sugih Jamin, Danny Raz, Yuval Shavitt, Cheng Jin, Sugih Jamin, Danny Raz, and Yuval Shavitt
- Subjects
- Computer networks, Electrical engineering, Computers, Professions, Computer science
- Abstract
Building Scalable Network Services: Theory and Practice is on building scalable network services on the Internet or in a network service provider's network. The focus is on network services that are provided through the use of a set of servers. The authors present a tiered scalable network service model and evaluate various services within this architecture. The service model simplifies design tasks by implementing only the most basic functionalities at lower tiers where the need for scalability dominates functionality. The book includes a number of theoretical results that are practical and applicable to real networks, such as building network-wide measurement, monitoring services, and strategies for building better P2P networks. Various issues in scalable system design and placement algorithms for service nodes are discussed. Using existing network services as well as potentially new but useful services as examples, the authors formalize the problem of placing service nodes and provide practical solutions for them.
- Published
- 2012
22. Radio Resource Management for Multimedia QoS Support in Wireless Networks
- Author
-
Huan Chen, Lei Huang, Sunil Kumar, C.C. Jay Kuo, Huan Chen, Lei Huang, Sunil Kumar, and C.C. Jay Kuo
- Subjects
- Computer networks, Multimedia systems, Computers, Professions, Electrical engineering
- Abstract
Due to the great success and enormous impact of IP networks, In ternet access (such as sending and receiving e-mails) and web brows ing have become the ruling paradigm for next generation wireless systems. On the other hand, great technological and commercial success of services and applications is being witnessed in mobile wire less communications with examples of cellular, pes voice telephony and wireless LANs. The service paradigm has thus shifted from the conventional voice service to seamlessly integrated high quality mul timedia transmission over broadband wireless mobile networks. The multimedia content may include data, voice, audio, image, video and so on. With availability of more powerful portable devices, such as PDA, portable computer and cellular phone, coupled with the easier access to the core network (using a mobile device), the number of mobile users and the demand for multimedia-based applications is increasing rapidly. As a result, there is an urgent need for a sys tem that supports heterogeneous multimedia services and provides seamless access to the desired resources via wireless connections. Therefore, the convergence of multimedia communication and wireless mobile networking technologies into the next generation wireless multimedia (WMM) networks with the vision of'anytime, anywhere, anyform'information system is the certain trend in the foreseeable future. However, successful combination of these two technologies presents many challenges such as available spectral bandwidth, energy efficiency, seamless end-to-end communication, robustness, security, etc.
- Published
- 2012
23. Multifractal Based Network Traffic Modeling
- Author
-
Murali Krishna P, Vikram M. Gadre, Uday B. Desai, Murali Krishna P, Vikram M. Gadre, and Uday B. Desai
- Subjects
- Telecommunication, Electrical engineering, Computer networks, Business information services, Computers, Professions
- Abstract
Multifractal Based Network Traffic Modeling provides an overview of existing broadband traffic modeling based on the Poisson process and its variants like the MM1 models. It also provides very good coverage of models based on self-similar processes. Throughout the book, the authors have focused on the problem of broadband traffic modeling keeping in mind long range dependencies in broadband traffic. Graduate students, researchers, and individuals new to the areas of teletraffic modeling and communication network engineering will find this work especially helpful. The book could also be used as a textbook for a graduate level course on Teletraffic Modeling.
- Published
- 2012
24. Smart Networks : IFIP TC6 / WG6.7 Seventh International Conference on Intelligence in Networks (SmartNet 2002) April 8–10, 2002, Saariselkä, Lapland, Finland
- Author
-
Olli Martikainen, Kimmo Raatikainen, Jenni Hyvärinen, Olli Martikainen, Kimmo Raatikainen, and Jenni Hyvärinen
- Subjects
- Computer networks, Telecommunication, Data structures (Computer science), Information theory, Computers, Professions, Artificial intelligence
- Abstract
Smart Networks comprises the proceedings of Smartnet'2002, the seventh conference on Intelligence in Networks, which was sponsored by the International Federation for Information Processing (IFIP) and organized by Working Group 6.7. It was held in Saariselkä, Finland, in April 2002. The conference series closely reflects the developments in networking.
- Published
- 2012
25. Disseminating Security Updates at Internet Scale
- Author
-
Jun Li, Peter Reiher, Gerald J. Popek, Jun Li, Peter Reiher, and Gerald J. Popek
- Subjects
- Computer science, Computers, Professions, Microprocessors, Computer architecture, Electronic data processing—Management, Computer networks
- Abstract
Disseminating Security Updates at Internet Scale describes a new system,'Revere', that addresses these problems.'Revere'builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push security updates from dissemination centers to individual nodes.'Revere'also sets up repository servers for individual nodes to pull missed security updates. This book further discusses how to protect this push-and-pull dissemination procedure and how to secure'Revere'overlay networks, considering possible attacks and countermeasures. Disseminating Security Updates at Internet Scale presents experimental measurements of a prototype implementation of'Revere'gathered using a large-scale oriented approach. These measurements suggest that'Revere'can deliver security updates at the required scale, speed and resiliency for a reasonable cost. Disseminating Security Updates at Internet Scale will be helpful to those trying to design peer systems at large scale when security is a concern, since many of the issues faced by these designs are also faced by'Revere'. The'Revere'solutions may not always be appropriate for other peer systems with very different goals, but the analysis of the problems and possible solutions discussed here will be helpful in designing a customized approach for such systems.
- Published
- 2012
26. Secure Electronic Voting
- Author
-
Dimitris A. Gritzalis and Dimitris A. Gritzalis
- Subjects
- Computer science, Electronic data processing—Management, Computers, Professions, Computer networks, Microprocessors, Computer architecture
- Abstract
Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting systems. The chapters identify and describe the given capabilities and the strong limitations, as well as the current trends and future perspectives of electronic voting technologies, with emphasis in security and privacy. Secure Electronic Voting includes state-of-the-art material on existing and emerging electronic and Internet voting technologies, which may eventually lead to the development of adequately secure e-voting systems. This book also includes an overview of the legal framework with respect to voting, a description of the user requirements for the development of a secure e-voting system, and a discussion on the relevant technical and social concerns. Secure Electronic Voting includes, also, three case studies on the use and evaluation of e-voting systems in three different real world environments.
- Published
- 2012
27. Scalable Performance Signalling and Congestion Avoidance
- Author
-
Michael Welzl and Michael Welzl
- Subjects
- Computer networks, Telecommunication, Electrical engineering, Computers, Professions, Multimedia systems, Computer science
- Abstract
This book answers a question which came about while the author was work ing on his diploma thesis [1]: would it be better to ask for the available band width instead of probing the network (like TCP does)? The diploma thesis was concerned with long-distance musical interaction ('NetMusic'). This is a very peculiar application: only a small amount of bandwidth may be necessary, but timely delivery and reduced loss are very important. Back then, these require ments led to a thorough investigation of existing telecommunication network mechanisms, but a satisfactory answer to the question could not be found. Simply put, the answer is'yes'- this work describes a mechanism which indeed enables an application to'ask for the available bandwidth'. This obvi ously does not only concern online musical collaboration any longer. Among others, the mechanism yields the following advantages over existing alterna tives: • good throughput while maintaining close to zero loss and a small bottleneck queue length • usefulness for streaming media applications due to a very smooth rate • feasibility for satellite and wireless links • high scalability Additionally, a reusable framework for future applications that need to'ask the network'for certain performance data was developed.
- Published
- 2012
28. Security in the Information Society : Visions and Perspectives
- Author
-
M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan, M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, and Heba K. Aslan
- Subjects
- Cryptography, Data encryption (Computer science), Engineering, Computer networks, Computer science, Electronic data processing—Management, Computers, Professions
- Abstract
Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as'Information'gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking. Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; Education and Curriculum for Information Security; Social and Ethical Aspects of Information Security; Information Security Services; Multilateral Security; Applications of Information Security; Infrastructure for Information Security Advanced Topics in Security; Legislation for Information Security; Modeling and Analysis for Information Security; Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt.
- Published
- 2012
29. Broadband Satellite Communications for Internet Access
- Author
-
Sastri L. Kota, Kaveh Pahlavan, Pentti A. Leppänen, Sastri L. Kota, Kaveh Pahlavan, and Pentti A. Leppänen
- Subjects
- Computer science, Electrical engineering, Computer networks, Computers, Professions
- Abstract
Broadband Satellite Communications for Internet Access is a systems engineering methodology for satellite communication networks. It discusses the implementation of Internet applications that involve network design issues usually addressed in standard organizations. Various protocols for IP- and ATM-based networks are examined and a comparative performance evaluation of different alternatives is described. This methodology can be applied to similar evaluations over any other transport medium.
- Published
- 2011
30. Networking Infrastructure for Pervasive Computing : Enabling Technologies and Systems
- Author
-
Debashis Saha, Amitava Mukherjee, Somprakash Bandyopadhyay, Debashis Saha, Amitava Mukherjee, and Somprakash Bandyopadhyay
- Subjects
- Computers, Professions, Electrical engineering, Computer networks
- Abstract
Networking Infrastructure for Pervasive Computing: Enabling Technologies & Systems is a comprehensive guide to tomorrow's world of ubiquitous computing where users can access and manipulate information from everywhere at all times. The emphasis is on networking, systems and standards rather than detailed physical implementation. Addressed are many technical obstacles, such as, connectivity, levels of service, performance, and reliability and fairness. The authors also describe the existing enabling off-the-shelf technologies and its underlying infrastructure known as pervasive networking (PervNet). PervNet ties different sets of smart nodes together enabling them to communicate with each other to provide pervasive computing services to users. Throughout the book, important issues related to scalability, transparency, security, energy management, QoS provisioning, fault tolerance, and disconnected operations are discussed. This work provides a research and development perspective to the field of PervNet and will serve as an essential reference for network designers, operators and developers.
- Published
- 2011
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.