Explore and learn introductory topics about programming mechanisms for memory management available for Microsoft Windows. This book uses C++ pointers and specialized APIs such as the smart pointers of the C++ Standard Library and Microsoft UCRT functions. You’ll also see how to work with lvalue and rvalue references. Introducing Mechanisms and APIs for Memory Management begins with topics about hardware features on the Intel x86 and Intel 64 (x64/amd64) hardware architectures and memory manage...
Economics of Information Security and Privacy III
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and an...
Cognitive Radio Mobile Ad Hoc Networks
Cognitive radios (CR) technology is capable of sensing its surrounding environment and adapting its internal states by making corresponding changes in certain operating parameters. CR is envisaged to solve the problems of the limited available spectrum and the inefficiency in the spectrum usage. CR has been considered in mobile ad hoc networks (MANETs), which enable wireless devices to dynamically establish networks without necessarily using a fixed infrastructure. The changing spectrum environm...
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference Mobile Lightweight Wireless Systems (MOBILIGHT 2011) held in Bilbao, Spain on May 9-10. 2011. In numbers, MOBILIGHT 2011 was organized as a 2-day single-track event with 18 technical presentations, and 3 specialized workshops focused on opportunistic sensing and processing in mobile wireless sensor and cellular networks (MOBISENSE), multimode wireless access networks (MOWAN) and s...
This book provides an analysis of transmission power and network performance in different wireless communication networks. It presents the latest research and techniques for power and interference control and performance modeling in wireless communication networks with different network topologies, air interfaces, and transmission techniques. While studying the power distributions and resource management, the reader will also learn basic methodology and skills for problem formulations, can ascer...
Visual Indexing and Retrieval (SpringerBriefs in Computer Science)
by Jenny Benois-Pineau, Frederic Precioso, and Matthieu Cord
The research in content-based indexing and retrieval of visual information such as images and video has become one of the most populated directions in the vast area of information technologies. Social networks such as YouTube, Facebook, FileMobile, and DailyMotion host and supply facilities for accessing a tremendous amount of professional and user generated data. The areas of societal activity, such as, video protection and security, also generate thousands and thousands of terabytes of visual...
Wireless Communications Networks for the Smart Grid (SpringerBriefs in Computer Science)
by Quang-Dung Ho, Yue Gao, Gowdemy Rajalingham, and Tho Le-Ngoc
This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and applications of two promising wireless mesh routing protocols that could be used to implement the SGCN. Packet transmission reliability, latency and robustness of these two protocols are evaluated and compared by simulations in various practical SGCN scenarios. Finally, technical challenges and open res...
Herausforderungen durch Echtzeitbetrieb (Informatik Aktuell)
Mit seinem Workshop 2011 zum Thema "Herausforderungen durch Echtzeitbetrieb" bietet der Fachausschuss Wissenschaftlern, Nutzern und Herstellern ein Forum an, auf dem neue Trends und Entwicklungen zu folgenden Programmschwerpunkten vorgestellt werden: Sicherheit, Mehrkernsysteme, Ausbildung, Entwurfsverfahren sowie Skalier- und Konfigurierbarkeit.
Traffic Mining Applied to Police Activities (Advances in Intelligent Systems and Computing, #728)
This book presents high-quality original contributions on the development of automatic traffic analysis systems that are able to not only anticipate traffic scenarios, but also understand the behavior of road users (vehicles, bikes, trucks, etc.) in order to provide better traffic management, prevent accidents and, potentially, identify criminal behaviors. Topics also include traffic surveillance and vehicle accident analysis using formal concept analysis, convolutional and recurrent neural netw...
Advances in optical technologies have made it possible to implement optical interconnections in future massively parallel processing systems. Photons are non-charged particles, and do not naturally interact. Consequently, there are many desirable characteristics of optical interconnects, e.g. high speed (speed of light), increased fanout, high bandwidth, high reliability, longer interconnection lengths, low power requirements, and immunity to EMI with reduced crosstalk. Optics can utilize...
Optical Burst Switched Networks (Lecture Notes in Mathematics, #1352) (Optical Networks)
by Jason P Jue and Vinod M Vokkarane
Next-generation high-speed Internet backbone networks will be required to support a broad range of emerging applications which may not only require significant bandwidth, but may also have strict quality of service (QoS) requirements. Furthermore, the traffic from such applications are expected to be highly bursty in nature. For such traffic, the allocation of static fixed-bandwidth circuits may lead to the over-provisioning of bandwidth resources in order to meet QoS requirements. Optical burst...
From Model-Driven Design to Resource Management for Distributed Embedded Systems presents 16 original contributions and 12 invited papers presented at the Working Conference on Distributed and Parallel Embedded Systems - DIPES 2006, sponsored by the International Federation for Information Processing - IFIP. Coverage includes model-driven design, testing and evolution of embedded systems, timing analysis and predictability, scheduling, allocation, communication and resource management in distrib...
Moving Wearables Into the Mainstream
by Joseph L Dvorak and J Nitsch
The term Wearable Technology encompasses a wide spectrum of devices, services and systems for wireless communications and the web. This book discusses characteristics and design elements required for wearable devices and systems to be embraced by the mainstream population for use in their everyday lives, introducing concepts such as Operational Inertia. The book discusses social and legal issues that may pose the greatest impediment to adoption of wearables. The book is structured to meet the ne...
Human-Computer Interaction (Lecture Notes in Computer Science, #753)
The International Conference on Human-Computer Interaction EWHCI '93 was thethird conference in a series which started in 1991 in Moscow. Like its predecessors, it was occasioned by the long separation of workers in HCI from one another and the new opportunity to learn from one another and to start cooperations with each other. The conference was international,with papers and participants from 16 countries. This volume contains a selection of the best papers presented at the co...
The Automated Technology for Veri?cation and Analysis (ATVA) international symposium series was initiated in 2003, responding to a growing interest in formal veri?cation spurred by the booming IT industry, particularly hardware design and manufacturing in East Asia. Its purpose is to promote research on automated veri?cation and analysis in the region by providing a forum for int- action between the regional and the international research/industrial commu- ties of the ?eld. ATVA 2005, the third...
Journal on Data Semantics II (Lecture Notes in Computer Science, #3360)
by S Spaccapietra
The LNCS Journal on Data Semantics is devoted to the presentation of notable work that, in one way or another, addresses research and development on issues related to data semantics. Based on the highly visible publication platform Lecture Notes in Computer Science, this new journal is widely disseminated and available worldwide. The scope of the journal ranges from theories supporting the formal definition of semantic content to innovative domain-specific applications of semantic knowledge. Th...
Security for Multi-hop Wireless Networks (SpringerBriefs in Computer Science)
by Mohamed M. E. A. Mahmoud and Xuemin (Sherman) Shen
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairn...
Multipath TCP for User Cooperation in Wireless Networks (SpringerBriefs in Computer Science)
by Dizhi Zhou and Wei Song
This brief presents several enhancement modules to Multipath Transmission Control Protocol (MPTCP) in order to support stable and efficient multipath transmission with user cooperation in the Long Term Evolution (LTE) network. The text explains how these enhancements provide a stable aggregate throughput to the upper-layer applications; guarantee a steady goodput, which is the real application-layer perceived throughput; and ensure that the local traffic of the relays is not adversely affected...
Time Division Multiple Access For Vehicular Communications (SpringerBriefs in Computer Science)
by Hassan Aboubakr Omar and Weihua Zhuang
This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. The performance of VeMAC is evaluated via mathematical analysis and computer simulations in comparison with other existing MAC protocols, including the IEEE 802.11p standard. This brief aims at proposing TDMA as a suitable MAC scheme for VANETs, which can support the quality-of-service requirements of...
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Wireless Internet, WICON 2013, held in Shanghai, China, in April 2012. The 20 revised full papers were carefully reviewed and selected from numerous submissions. The papers cover topics such as vehicular communications and heterogeneous networks, cognitive radio and multi-antenna systems, networks and beyond, ad hoc and mesh networks.