Browse Results

Showing 48,051 through 48,075 of 61,701 results

Resilient Routing in Communication Networks

by Jacek Rak

This important text addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). Features: discusses FI architecture for network virtualization; introduces proposals for dedicated and shared protection in random failure scenarios and against malicious activities; describes measures for WMN survivability that allow for evaluation of performance under multiple failures; proposes a new scheme to enable proactive updates of WMN antenna alignment; includes a detailed analysis of the differentiated reliability requirements for VANET applications, with a focus on issues of multihop data delivery; reviews techniques for improving the stability of end-to-end VANET communication paths based on multipath routing and anycast forwarding.

Resilient Routing in Communication Networks: A Systems Perspective (Computer Communications and Networks)

by Jacek Rak

This practically focused monograph addresses the latest issues of resilient routing in networked systems. It consists of three parts and offers an in-depth introduction to the resilience of networked systems (Part I), a detailed description of schemes of resilient routing (Part II), and examples of the application of resilience mechanisms in selected communication scenarios (Part III). Topics and features: presents the essentials of network resilience; highlights the main causes of network node and link failures; elaborates on the costs and benefits of investing in resilience; discusses the taxonomy of challenges, faults, attributes, and disciplines of resilience; overviews the major metrics useful in evaluating resilience; provides a detailed classification of resilient routing schemes; analyzes the features of optimization models for selected problems of resilient routing; illustrates the properties of computationally efficient methods for determining the shortest sets of disjoint communication paths; shows the practical use of resilient routing mechanisms in selected communication scenarios with a particular focus on up-to-date concepts such as network virtualization or content-centric networking.

Resilient Wireless Sensor Networks

by Osameh M. Al-Kofahi Ahmed E. Kamal

This Springer Brief introduces wireless sensor networks (WSNs) and the need for resilient WSN operations in application domains. It presents traditional approaches of providing resilient operation of WSNs to ensure continuity of data delivery even when some network sensors fail. The pros and cons of each these approaches are discussed. Also included is an overview of network coding basics, and motivate the use of network coding-based protection in order to combine the advantages, but avoid the disadvantages of the traditional approaches. The authors cover the design and analysis of a centralized approach to network coding-based protection of WSNs. The coverage also includes practical and realistic network situations, and the coding strategies employed. Next discussed is how to recover from data losses using a distributed approach, which is more practical for large scale WSNs. Algorithms for scheduling of transmissions while implementing network coding-based in the two cases of using digital network coding, and analog network coding are covered. Resilient Wireless Sensor Networks includes a concise, but an in-depth coverage of the use of network coding to implement agile and resource efficient protection in WSNs. It will be of interest to professionals and researchers working in the areas of fault tolerance, network coding, and deployment of WSNs in harsh environment. Advanced-level students in electrical engineering and computer science will also find this research valuable as a reference.

Resilient computer system design

by Igor Schagaev Victor Castano

This book presents a paradigm for designing new generation resilient and evolving computer systems, including their key concepts, elements of supportive theory, methods of analysis and synthesis of ICT with new properties of evolving functioning, as well as implementation schemes and their prototyping. The book explains why new ICT applications require a complete redesign of computer systems to address challenges of extreme reliability, high performance, and power efficiency. The authors present a comprehensive treatment for designing the next generation of computers, especially addressing safety critical, autonomous, real time, military, banking, and wearable health care systems.

Resistance to the Current: The Dialectics of Hacking (Information Policy)

by Johan Soderberg Maxigas

How hacking cultures drive contemporary capitalism and the future of innovation.In Resistance to the Current, Johan Söderberg and Maxigas examine four historical case studies of hacker movements and their roles in shaping the twenty-first-century&’s network society. Based on decades of field work and analysis, this intervention into current debates situates an exploding variety of hacking practices within the contradictions of capitalism. Depoliticized accounts of computing cultures and collaborative production miss their core driver, write Söderberg and Maxigas: the articulation of critique and its recuperation into innovations.Drawing on accounts of building, developing, and running community wireless networks, 3D printers, hackerspaces, and chat protocols, the authors develop a theoretical framework of critique and recuperation to examine how hackers—who have long held a reputation for being underground rebels—transform their outputs from communal, underground experiments to commercial products that benefit the state and capital. This framework allows a dialectical understanding of contemporary social conflicts around technology and innovation. Hackers&’ critiques of contemporary norms spur innovation, while recuperation turns these innovations into commodified products and services. Recuperation threatens the autonomy of hacker collectives, harnessing their outputs for the benefit of a capitalist system.With significant practical implications, this sophisticated multidisciplinary account of technology-oriented movements that seek to challenge capitalism will appeal to science and technology readers interested in innovation studies, user studies, cultural studies, and media and communications.

Resistance, Liberation Technology and Human Rights in the Digital Age

by Giovanni Ziccardi

This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference between hacking and computer crimes, the book explains concepts of hacktivism, the information war between states, a new form of politics (such as open data movements, radical transparency, crowd sourcing and "Twitter Revolutions"), and the hacking of political systems and of state technologies. The book focuses on the protection of human rights in countries with oppressive regimes.

Resonant Games: Design Principles for Learning Games that Connect Hearts, Minds, and the Everyday (Digital Media and Learning)

by Eric Klopfer Jason Haas Scot Osterweil Louisa Rosenheck

Principles for designing educational games that integrate content and play and create learning experiences connecting to many areas of learners' lives. Too often educational videogames are narrowly focused on specific learning outcomes dictated by school curricula and fail to engage young learners. This book suggests another approach, offering a guide to designing games that integrates content and play and creates learning experiences that connect to many areas of learners' lives. These games are not gamified workbooks but are embedded in a long-form experience of exploration, discovery, and collaboration that takes into consideration the learning environment. Resonant Games describes twenty essential principles for designing games that offer this kind of deeper learning experience, presenting them in connection with five games or collections of games developed at MIT's educational game research lab, the Education Arcade.Each of the games—which range from Vanished, an alternate reality game for middle schoolers promoting STEM careers, to Ubiquitous Bio, a series of casual mobile games for high school biology students—has a different story, but all spring from these fundamental assumptions: honor the whole learner, as a full human being, not an empty vessel awaiting a fill-up; honor the sociality of learning and play; honor a deep connection between the content and the game; and honor the learning context—most often the public school classroom, but also beyond the classroom.

Resonant Scattering and Generation of Waves: Cubically Polarizable Layers (Mathematical Engineering Ser.)

by Lutz Angermann Vasyl V. Yatsyk

This monograph deals with theoretical aspects and numerical simulations of the interaction of electromagnetic fields with nonlinear materials. It focuses in particular on media with nonlinear polarization properties. It addresses the direct problem of nonlinear Electrodynamics, that is to understand the nonlinear behavior in the induced polarization and to analyze or even to control its impact on the propagation of electromagnetic fields in the matter. The book gives a comprehensive presentation of the results obtained by the authors during the last decade and put those findings in a broader, unified context and extends them in several directions.It is divided into eight chapters and three appendices. Chapter 1 starts from the Maxwell’s equations and develops a wave propagation theory in plate-like media with nonlinear polarizability. In chapter 2 a theoretical framework in terms of weak solutions is given in order to prove the existence and uniqueness of a solution of the semilinear boundary-value problem derived in the first chapter. Chapter 3 presents a different approach to the solvability theory of the reduced frequency-domain model. Here the boundary-value problem is reduced to finding solutions of a system of one-dimensional nonlinear Hammerstein integral equations. Chapter 4 describes an approach to the spectral analysis of the linearized system of integral equations. Chapters 5 and 6 are devoted to the numerical approximation of the solutions of the corresponding mathematical models. Chapter 7 contains detailed descriptions, discussions and evaluations of the numerical experiments. Finally, chapter 8 gives a summary of the results and an outlook for future work.

Resonant Tunneling: Quantum Waveguides of Variable Cross-Section, Asymptotics, Numerics, and Applications (Lecture Notes on Numerical Methods in Engineering and Sciences)

by Pekka Neittaanmäki Lev Baskin Boris Plamenevskii Oleg Sarafanov

This book studies electron resonant tunneling in two- and three-dimensional quantum waveguides of variable cross-sections in the time-independent approach. Mathematical models are suggested for the resonant tunneling and develop asymptotic and numerical approaches for investigating the models. Also, schemes are presented for several electronics devices based on the phenomenon of resonant tunneling. Compared to its first edition, this book includes four new chapters, redistributes the content between chapters and modifies the estimates of the remainders in the asymptotics of resonant tunneling characteristics. The book is addressed to mathematicians, physicists, and engineers interested in waveguide theory and its applications in electronics.

Resource Allocation for Software Defined Networks (SpringerBriefs in Computer Science)

by Dariusz Gasior

The book is devoted to the selected resource allocation problems in Software- Defined Networks. Moreover, it covers results concerning Software Defined Wide Area Networks (SD-WANs) which is one of the current networking hot topics. The variety of different cases is considered including virtualization and information-centric paradigm. For each case, the mathematical model together with the problem formulation is given and some solution algorithms are proposed. The algorithms are discussed and evaluated, mostly with simulations.

Resource Allocation in Decentralized Systems with Strategic Agents

by Ali Kakhbod

This thesis presents a significant contribution to decentralized resource allocation problems with strategic agents. The study focused on three classes of problems arising in communication networks. (C1). Unicast service provisioning in wired networks. (C2). Multi-rate multicast service provisioning in wired networks. (C3). Power allocation and spectrum sharing in multi-user multi-channel wireless communication systems. Problems in (C1) are market problems; problems in (C2) are a combination of markets and public goods; problems in (C3) are public goods. Dr. Kakhbod developed game forms/mechanisms for unicast and multi-rate multicast service provisioning that possess specific properties. First, the allocations corresponding to all Nash equilibria (NE) of the games induced by the mechanisms are optimal solutions of the corresponding centralized allocation problems, where the objective is the maximization of the sum of the agents' utilities. Second, the strategic agents voluntarily participate in the allocation process. Third, the budget is balanced at the allocations corresponding to all NE of the game induced by the mechanism as well as at all other feasible allocations. For the power allocation and spectrum sharing problem, he developed a game form that possesses the second and third properties as detailed above along with a fourth property: the allocations corresponding to all NE of the game induced by the mechanism are Pareto optimal. The thesis contributes to the state of the art of mechanism design theory. In particular, designing efficient mechanisms for the class of problems that are a combination of markets and public goods, for the first time, have been addressed in this thesis. The exposition, although highly rigorous and technical, is elegant and insightful which makes this thesis work easily accessible to those just entering this field and will also be much appreciated by experts in the field.

Resource Allocation in Network Function Virtualization: Problems, Models and Algorithms

by Song Yang Fan Li Xiaoming Fu Nan He

Network Function Virtualization (NFV) has recently attracted considerable attention from both research and industrial communities. Numerous papers have been published regarding solving the resource- allocation problems in NFV, from various perspectives, considering different constraints, and adopting a range of techniques. However, it is difficult to get a clear impression of how to understand and classify different kinds of resource allocation problems in NFV and how to design solutions to solve these problems efficiently.This book addresses these concerns by offering a comprehensive overview and explanation of different resource allocation problems in NFV and presenting efficient solutions to solve them. It covers resource allocation problems in NFV, including an introduction to NFV and QoS parameters modelling as well as related problem definition, formulation and the respective state-of-the-art algorithms.This book allows readers to gain a comprehensive understanding of and deep insights into the resource allocation problems in NFV. It does so by exploring (1) the working principle and architecture of NFV, (2) how to model the Quality of Service (QoS) parameters in NFV services, (3) definition, formulation and analysis of different kinds of resource allocation problems in various NFV scenarios, (4) solutions for solving the resource allocation problem in NFV, and (5) possible future work in the respective area.

Resource Discovery, Navigability and Trust Management Techniques for IoT and SIoT

by Venugopal K R Roopa M S Santosh Pattar

A ready reference for the next-generation discovery techniques, this book presents advanced research findings on resource discovery, network navigability, and trust management on the Internet of Things (IoT) and Social Internet of Things (SIoT) ecosystems. It discusses the benefits of integrating social networking concepts into the Internet of Things to find the preferable, reliable, scalable, and near-optimal detection of things or services. It explores the concepts of the Social Internet of Things in different domains of IoT, such as the Internet of Vehicles and the Industrial Internet of Things. This book works to recognize and respond to user queries and improve service provisioning, find the optimal solution for the link selection in the SIoT structure, develop large-scale platforms, and provide a smart mechanism for trust evaluation.· Covers the rapid advancements in low-cost sensor manufacturing, communication protocols, embedded systems, actuators, and hardware miniaturization that have contributed to the exponential growth of the IoT· Presents the fundamentals of a search system for sensor search and resource discovery in an IoT ecosystem· Includes the applicability of different search techniques across several application domains of the IoT under various use case scenarios· Discusses the thrust areas in SIoT (service discovery and composition, network navigability, relationship management, and trustworthiness management) and presents several prerequisites, challenges, and use case scenarios· Provides insights into current challenges in the domains of Internet of Things and Social Internet of ThingsThis book will be helpful to researchers, scholars, and postgraduate students in Computer Science and Information Technology departments.

Resource Management and Performance Analysis of Wireless Communication Networks

by Wuyi Yue Shunfu Jin

With the diversification of Internet services and the increase in mobile users, efficient management of network resources has become an extremely important issue in the field of wireless communication networks (WCNs). Adaptive resource management is an effective tool for improving the economic efficiency of WCN systems as well as network design and construction, especially in view of the surge in mobile device demands.This book presents modelling methods based on queueing theory and Markov processes for a wide variety of WCN systems, as well as precise and approximate analytical solution methods for the numerical evaluation of the system performance.This is the first book to provide an overview of the numerical analyses that can be gleaned by applying queueing theory, traffic theory and other analytical methods to various WCN systems. It also discusses the recent advances in the resource management of WCNs, such as broadband wireless access networks, cognitive radio networks, and green cloud computing. It assumes a basic understanding of computer networks and queueing theory, and familiarity with stochastic processes is also recommended.The analysis methods presented in this book are useful for first-year-graduate or senior computer science and communication engineering students. Providing information on network design and management, performance evaluation, queueing theory, game theory, intelligent optimization, and operations research for researchers and engineers, the book is also a valuable reference resource for students, analysts, managers and anyone in the industry interested in WCN system modelling, performance analysis and numerical evaluation.

Resource Management for Big Data Platforms

by Joanna Kołodziej Beniamino Di Martino Florin Pop

Serving as a flagship driver towards advance research in the area of Big Data platforms and applications, this book provides a platform for the dissemination of advanced topics of theory, research efforts and analysis, and implementation oriented on methods, techniques and performance evaluation. In 23 chapters, several important formulations of the architecture design, optimization techniques, advanced analytics methods, biological, medical and social media applications are presented. These chapters discuss the research of members from the ICT COST Action IC1406 High-Performance Modelling and Simulation for Big Data Applications (cHiPSet). This volume is ideal as a reference for students, researchers and industry practitioners working in or interested in joining interdisciplinary works in the areas of intelligent decision systems using emergent distributed computing paradigms. It will also allow newcomers to grasp the key concerns and their potential solutions.

Resource Management for Device-to-Device Underlay Communication

by Zhu Han Lingyang Song Chen Xu

Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communication brings large benefits in terms of system capacity, it also causes interference as well as increased computation complexity to cellular networks as a result of spectrum sharing. Thus, efficient resource management must be performed to guarantee a target performance level of cellular communication. This brief presents the state-of-the-art research on resource management for D2D communication underlaying cellular networks. Those who work with D2D communication will use this book's information to help ensure their work is as efficient as possible. Along with the survey of existing work, this book also includes the fundamental theories, key techniques, and applications.

Resource Management for Energy and Spectrum Harvesting Sensor Networks

by Zhigang Chen Xuemin Sherman Shen Haibo Zhou Deyu Zhang

This SpringerBrief offers a comprehensive review and in-depth discussion of the current research on resource management. The authors explain how to best utilize harvested energy and temporally available licensed spectrum. Throughout the brief, the primary focus is energy and spectrum harvesting sensor networks (ESHNs) including energy harvesting (EH)-powered spectrum sensing and dynamic spectrum access. To efficiently collect data through the available licensed spectrum, this brief examines the joint management of energy and spectrum. An EH-powered spectrum sensing and management scheme for Heterogeneous Spectrum Harvesting Sensor Networks (HSHSNs) is presented in this brief. The scheme dynamically schedules the data sensing and spectrum access of sensors in ESHSNs to optimize the network utility, while considering the stochastic nature of EH process, PU activities and channel conditions. This brief also provides useful insights for the practical resource management scheme design for ESHSNs and motivates a new line of thinking for future sensor networking. Professionals, researchers, and advanced-level students in electrical or computer engineering will find the content valuable.

Resource Management for Internet of Things

by Flávia C. Delicato Paulo F. Pires Thais Batista

This book investigates the pressing issue of resource management for Internet of Things (IoT). The unique IoT ecosystem poses new challenges and calls for unique and bespoke solutions to deal with these challenges. Using a holistic approach, the authors present a thorough study into the allocation of the resources available within IoT systems to accommodate application requirements. This is done by investigating different functionalities and architectural approaches involved in a basic workflow for managing the lifecycle of resources in an IoT system. Resource Management for the Internet of Things will be of interest to researchers and students as well as professional developers interested in studying the IoT paradigm from data acquisition to the delivery of value-added services for the end user.

Resource Management for Multimedia Services in High Data Rate Wireless Networks

by Ruonan Zhang Lin Cai Jianping Pan

This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.

Resource Management in Cloud Computing: Concepts and Implementation

by Ashutosh Kumar Singh Sakshi Patni Deepika Saxena

This book addresses fundamental concepts and practical implementations in cloud computing environments, focusing on load balancing and resource management. As cloud computing's popularity grows, expertise in infrastructure management is crucial for delivering flawless subscription-based services and hosted data solutions. The book presents novel models for cloud resource management to improve operational efficiency through better virtual machine (VM) placements. Beginning with task scheduling and resource allocation basics, the book progresses to resource management concepts. It introduces innovative models for dynamic resource allocation, heuristic approaches for optimal host selection, secure resource management frameworks, multi-objective VM allocation schemes, and data security models. A significant contribution is an effective model integrating load balancing, resource management, Quality of Service (QoS), security, and cloud performance for Infrastructure as a Service (IaaS). The book offers innovative methodologies for dynamic resource allocation and service administration in cloud datacenters. It presents traffic management techniques to reduce energy consumption, improve resource utilization, and enhance security through optimized VM placement, with experimental validation. These models improve response time, throughput, resource utilization, energy consumption, and failure node management. Security is addressed through secure VM placement strategies, making it harder for attackers to achieve co-tenancy. A multi-objective approach for secure load balancing optimizes multiple conflicting objectives simultaneously. The book includes cyber-threat countermeasures and provides recommendations for organizations and users. Suitable for senior undergraduate and graduate courses in cloud computing, resource allocation, security, and energy consumption methods, the book includes examples and tutorials using Cloudsim tools for beginners. This helps them understand virtual infrastructure and service design. The methodologies benefit both cloud service providers and customers, offering cost-effective solutions for revenue maximization. The comprehensive approach makes the book valuable for academic study and practical application in cloud computing environments.

Resource Management in Real-Time Systems and Networks

by C. Siva Ram Murthy G. Manimaran

Real-time systems and networks are of increasing importance in many applications, including automated factories, telecommunication systems, defense systems, and space systems. This book introduces the concepts and state-of-the-art research developments of resource management in real-time systems and networks. Unlike other texts in the field, it covers the entire spectrum of issues in resource management, including task scheduling in uniprocessor real-time systems; task scheduling, fault-tolerant task scheduling, and resource reclaiming in multiprocessor real-time systems; conventional task scheduling and object-based task scheduling in distributed real-time systems; message scheduling; QoS routing; dependable communication; multicast communication; and medium access protocols in real-time networks. It provides algorithmic treatments for all of the issues addressed, highlighting the intuition behind each algorithm and giving examples. The book also includes two chapters of case studies.

Resource Management in Utility and Cloud Computing

by Xiaolin Li Han Zhao

This SpringerBrief reviews the existing market-oriented strategies for economically managing resource allocation in distributed systems. It describes three new schemes that address cost-efficiency, user incentives, and allocation fairness with regard to different scheduling contexts. The first scheme, taking the Amazon EC2(tm) market as a case of study, investigates the optimal resource rental planning models based on linear integer programming and stochastic optimization techniques. This model is useful to explore the interaction between the cloud infrastructure provider and the cloud resource customers. The second scheme targets a free-trade resource market, studying the interactions amongst multiple rational resource traders. Leveraging an optimization framework from AI, this scheme examines the spontaneous exchange of resources among multiple resource owners. Finally, the third scheme describes an experimental market-oriented resource sharing platform inspired by eBay's transaction model. The study presented in this book sheds light on economic models and their implication to the utility-oriented scheduling problems.

Resource Management on Distributed Systems: Principles and Techniques

by Shikharesh Majumdar

Comprehensive guide to the principles, algorithms, and techniques underlying resource management for clouds, big data, and sensor-based systems Resource Management on Distributed Systems provides helpful guidance by describing algorithms and techniques for managing resources on parallel and distributed systems, including grids, clouds, and parallel processing-based platforms for big data analytics. The book focuses on four general principles of resource management and their impact on system performance, energy usage, and cost, including end-of-chapter exercises. The text includes chapters on sensors, autoscaling on clouds, complex event processing for streaming data, and data filtering techniques for big data systems. The book also covers results of applying the discussed techniques on simulated as well as real systems (including clouds and big data processing platforms), and techniques for handling errors associated with user predicted task execution times. Written by a highly qualified academic with significant research experience in the field, Resource Management on Distributed Systems includes information on sample topics such as: Attributes of parallel/distributed applications that have an intimate relationship with system behavior and performance, plus their related performance metrics.Handling a lack of a prior knowledge of local operating systems on individual nodes in a large system.Detection and management of complex events (that correspond to the occurrence of multiple raw events) on a platform for streaming analytics.Techniques for reducing data latency for multiple operator-based queries in an environment processing large textual documents. With comprehensive coverage of core topics in the field, Resource Management on Distributed Systems is a comprehensive guide to resource management in a single publication and is an essential read for professionals, researchers and students working with distributed systems.

Resource Proportional Software Design for Emerging Systems

by Suparna Bhattacharya Kanchi Gopinath Doug Voigt

Efficiency is a crucial concern across computing systems, from the edge to the cloud. Paradoxically, even as the latencies of bottleneck components such as storage and networks have dropped by up to four orders of magnitude, software path lengths have progressively increased due to overhead from the very frameworks that have revolutionized the pace of information technology. Such overhead can be severe enough to overshadow the benefits from switching to new technologies like persistent memory and low latency interconnects. Resource Proportional Software Design for Emerging Systems introduces resource proportional design (RPD) as a principled approach to software component and system development that counters the overhead of deeply layered code without removing flexibility or ease of development. RPD makes resource consumption proportional to situational utility by adapting to diverse emerging needs and technology systems evolution. Highlights: Analysis of run-time bloat in deep software stacks, an under-explored source of power-performance wastage in IT systems Qualitative and quantitative treatment of key dimensions of resource proportionality Code features: Unify and broaden supported but optional features without losing efficiency Technology and systems evolution: Design software to adapt with changing trade-offs as technology evolves Data processing: Design systems to predict which subsets of data processed by an (analytics or ML) application are likely to be useful System wide trade-offs: Address interacting local and global considerations throughout software stacks and hardware including cross-layer co-design involving code, data and systems dimensions, and non-functional requirements such as security and fault tolerance Written from a systems perspective to explore RPD principles, best practices, models and tools in the context of emerging technologies and applications This book is primarily geared towards practitioners with some advanced topics for researchers. The principles shared in the book are expected to be useful for programmers, engineers and researchers interested in ensuring software and systems are optimized for existing and next generation technologies. The authors are from both industry (Bhattacharya and Voigt) and academic (Gopinath) backgrounds.

Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications (Wireless Networks and Mobile Communications)

by Yan Zhang Honglin Hu Masayuki Fujise

Organized into three parts, Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications examines the inherent constraint of limited bandwidth and unreliable time-varying physical link in the wireless system, discusses the demand to realize the service continuity in the single-hop or multi-hop wireless networks, and ex

Refine Search

Showing 48,051 through 48,075 of 61,701 results