Connected Vehicles (Wireless Networks)
This book introduces concepts and technologies of Intelligent Transportation Systems (ITS). It describes state of the art safety communication protocol called Dedicated Short Range Communication (DSRC), currently being considered for adoption by the USDOT and automotive industry in the US. However, the principles of this book are applicable even if the underlying physical layer protocol of V2X changes in the future, e.g. V2X changes from DSRC to cellular-based connectivity. Fundamental ITS c...
Learn to create a Web page in only a matter of hours--it's that easy! In this Second Edition of the best-selling WebMaster Windows, LeVitus and Evans have returned to the drawing board to update every aspect of this fun and easy-to-read guide for turning a Macintosh into a World Wide Web server. Readers get the newest information on software, HTML editors, tools, and applications. Not only is the text completely updated--with the author's immensely entertaining and witty style intact--but the CD...
Self-adaptive software evaluates its own behavior and changes its behavior when the evaluation indicates that the software does not accomplish what it is intended to do or when better functionality or better performance is possible. The self-adaptive approach in software engineering builds on well-known features like the use of errors and the handling of exceptions in languages like Lisp or Java and aims at improving the robustness of software systems by gradually adding new features of self-ada...
Internet Werkzeuge und Dienste
by Martin Scheller, Klaus-Peter Boden, Andreas Geenen, and Joachim Kampermann
Wer sich im Internet orientieren möchte, benötigt einen guten Wegweiser, den er in diesem Buch von der "Gebrauchsanleitung" bis hin zu den aktuellen Entwicklungen findet.
Al1e fehlertoleranten Systeme erfordern den Einsatz redundanter Hardwarekom- ponenten. Solche Systeme bestehen aus zwei oder mehreren autonomen Verarbeitungs- einheiten mit Processoren, Speichern und peripheren Geraten. Fehlertolerante Systeme werden unterschieden, o inwieweit die redundante Hardware im Normalbetrieb zusatzliche Rechenleistung erbringt o und wieviel Wissen beim Programmieren erforderlich ist, um fehlertolerante Pro- gramme zu schreiben. Mittlerweile haben sich zwei Methoden hera...
Software-Fehlertoleranz und -Zuverlassigkeit (Informatik-Fachberichte / Subreihe Kunstliche Intelligenz, #83)
1m vorliegenden Bericht tiber Software-Fehlertoleranz und -Zuverlassigkeit wird ein Problemkreis aus dem weitgefacherten Themenkomplex der Fehlertoleranz in Rechensystemen aufgegriffen, der in den letzten Jahren zunehmend an Bedeutung und Interesse gewonnen hat. Wahrend in der Vergangenheit ein Schwerpunkt der Fehlertoleranz-Konzepte und -Realisierungen darin lag, die Zuverlassigkeit von Rechensystemen durch MaBnahmen gegen den Ausfall von Hardware-Komponenten zu erhohen, wachst zusehends der Be...
This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications. The WIDECOM 2018 proceedings features papers addressing issues related to...
This book constitutes the thoroughly refereed postproceedings of the Second International Workshop on Semantic Web and Databases, SWDB 2004, held in Toronto, Canada in August 2004 as a satellite workshop of VLDB 2004. The 14 revised full papers presented together with 2 papers by the invited keynote speakers were carefully selected during two rounds of reviewing and improvement from 47 submissions. Among the topics addressed are data semantics, semantic Web services, service-oriented computing,...
Argumentation in Multi-Agent Systems (Lecture Notes in Computer Science, #6614) (Lecture Notes in Artificial Intelligence, #5384)
The theory of argumentation is a rich, interdisciplinary area of research lying across philosophy, communication studies, linguistics, and psychology (at least). Its techniques and results have found a wide range of applications in both t- oretical and practical branches of arti?cial intelligence and computer science. Several theories of argumentation with various semantics have been proposed in the literature. Multi-agent systems theory has picked up argument-inspired approaches and speci?cally...
Protocol Design and Analysis for Cooperative Wireless Networks (Wireless Networks)
by Wei Song, Peijian Ju, and A-Long Jin
This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive...
Recent Development in Wireless Sensor and Ad-hoc Networks (Signals and Communication Technology)
Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology w...
MCSE Designing a Windows 2000 Network Infrastructure Study Guide (exam 70-221)
This work offers advice for those people preparing for the Designing a W2K Network Infastructure exam. It features exercises which demonstrate how to design Windows 2000 networks, realistic practice questions at the end of each chapter and SkillBuilder CBT sofware on the accompanying CD-ROM.
Accountability and Privacy in Network Security
by Yuxiang Ma, Yulei Wu, and Jingguo Ge
This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts....
Computer Networks, Architecture and Applications covers many aspects of research in modern communications networks for computing purposes.
This book constitutes the proceedings of the 7th International Conference on Wireless and Satellite Services, WiSATS 2015, held in Bradford, UK, in July 2015. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. As the scope of the conference widened to include wireless systems, the conference was renamed to WiSATS. The 29 revised papers were presented at the conference in three technical sessions...
Web Intelligence: Research and Development (Lecture Notes in Computer Science, #2198) (Lecture Notes in Artificial Intelligence, #2198)
This volume contains the papers selected for presentation at the First Asia- Paci?c Conference on Web Intelligence (WI 2001) held in Maebashi TERRSA, Maebashi City,Japan,October 23-26,2001. It was sponsored by ACM SIGART and Maebashi Institute of Technology,in cooperation with ACM SIGCHI,ACM SIGWEB,the Japanese Society for Arti?cial Intelligence (JSAI),JSAI SIGFAI, JSAI SIGKBS,and IEICE SIGKBSE. The conference was held jointly with the Second Asia-Paci?c Conference on Intelligent Agent Technolog...
This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Technologies for E-Services held in September 2005. The nine revised full papers presented together with one keynote article were carefully reviewed and selected from forty submissions for inclusion in the book. Their common purpose is to identify the technical issues, models and infrastructures that enable enterprises to provide e-services to other businesses and individual customers.
The six-volume set LNCS 8579-8584 constitutes the refereed proceedings of the 14th International Conference on Computational Science and Its Applications, ICCSA 2014, held in Guimaraes, Portugal, in June/July 2014. The 347 revised papers presented in 30 workshops and a special track were carefully reviewed and selected from 1167. The 289 papers presented in the workshops cover various areas in computational science ranging from computational science technologies to specific areas of computationa...
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithm...
Building Automation (Signals and Communication Technology)
by Hermann Merz, Thomas Hansemann, and Christof Hubner
Modern buildings are increasingly equipped with actuators and sensors, communication, visualization and control systems. This textbook provides an overview of industrial communication systems and stimulates a basic understanding of network and bus systems for the automation of buildings. After an introduction to EIB/KNX, LON und BACnet technologies, the authors illustrate how these systems can be utilized for specific applications, like air conditioning or illumination. This book assumes only a...
This volume addresses the problem of designing efficient signalling and provides a link between the areas of communication theory and modem design for amplitude constrained linear optical intensity channel. It provides practical guidelines for the design of signalling sets for wireless optical intensity channels.
This book constitutes the proceedings of the 15th International Conference on Web Information Systems Engineering, WISE 2014, held in Thessaloniki, Greece, in October 2014. The 52 full papers, 16 short and 14 poster papers, presented in the two-volume proceedings LNCS 8786 and 8787 were carefully reviewed and selected from 196 submissions. They are organized in topical sections named: Web mining, modeling and classification; Web querying and searching; Web recommendation and personalization; se...