Proceedings
Author :
Publisher :
Page : 314 pages
File Size : 27,9 MB
Release : 1999
Category : Electronic data processing
ISBN :
Author :
Publisher :
Page : 314 pages
File Size : 27,9 MB
Release : 1999
Category : Electronic data processing
ISBN :
Author : Benjamin Kobler
Publisher :
Page : 488 pages
File Size : 17,50 MB
Release : 2000
Category : Computer storage devices
ISBN :
Author :
Publisher : IOS Press
Page : 7289 pages
File Size : 22,94 MB
Release :
Category :
ISBN :
Author : Shahram Latifi
Publisher : Springer
Page : 932 pages
File Size : 47,48 MB
Release : 2017-07-15
Category : Computers
ISBN : 3319549782
This volume presents a collection of peer-reviewed, scientific articles from the 14th International Conference on Information Technology – New Generations, held at the University of Nevada at Las Vegas on April 10–12, at Tuscany Suites Hotel in Las Vegas. The Book of Chapters addresses critical areas of information technology including web technology, communications, computing architectures, software engineering, security, and data mining.
Author : Jiwu Shu
Publisher : Springer Nature
Page : 436 pages
File Size : 44,51 MB
Release :
Category :
ISBN : 9819735343
Author : Jean-Philippe Vasseur
Publisher : Morgan Kaufmann
Page : 432 pages
File Size : 48,20 MB
Release : 2010-07-06
Category : Computers
ISBN : 0123751667
Interconnecting Smart Objects with IP: The Next Internet explains why the Internet Protocol (IP) has become the protocol of choice for smart object networks. IP has successfully demonstrated the ability to interconnect billions of digital systems on the global Internet and in private IP networks. Once smart objects can be easily interconnected, a whole new class of smart object systems can begin to evolve. The book discusses how IP-based smart object networks are being designed and deployed. The book is organized into three parts. Part 1 demonstrates why the IP architecture is well suited to smart object networks, in contrast to non-IP based sensor network or other proprietary systems that interconnect to IP networks (e.g. the public Internet of private IP networks) via hard-to-manage and expensive multi-protocol translation gateways that scale poorly. Part 2 examines protocols and algorithms, including smart objects and the low power link layers technologies used in these networks. Part 3 describes the following smart object network applications: smart grid, industrial automation, smart cities and urban networks, home automation, building automation, structural health monitoring, and container tracking. - Shows in detail how connecting smart objects impacts our lives with practical implementation examples and case studies - Provides an in depth understanding of the technological and architectural aspects underlying smart objects technology - Offers an in-depth examination of relevant IP protocols to build large scale smart object networks in support of a myriad of new services
Author : Khosrow-Pour, D.B.A., Mehdi
Publisher : IGI Global
Page : 3807 pages
File Size : 22,28 MB
Release : 2005-01-31
Category : Education
ISBN : 159140794X
Comprehensive coverage of critical issues related to information science and technology.
Author : Daniel A. Reed
Publisher : MIT Press
Page : 396 pages
File Size : 20,83 MB
Release : 2003-10-24
Category : Computers
ISBN : 9780262681421
The major research results from the Scalable Input/Output Initiative, exploring software and algorithmic solutions to the I/O imbalance. As we enter the "decade of data," the disparity between the vast amount of data storage capacity (measurable in terabytes and petabytes) and the bandwidth available for accessing it has created an input/output bottleneck that is proving to be a major constraint on the effective use of scientific data for research. Scalable Input/Output is a summary of the major research results of the Scalable I/O Initiative, launched by Paul Messina, then Director of the Center for Advanced Computing Research at the California Institute of Technology, to explore software and algorithmic solutions to the I/O imbalance. The contributors explore techniques for I/O optimization, including: I/O characterization to understand application and system I/O patterns; system checkpointing strategies; collective I/O and parallel database support for scientific applications; parallel I/O libraries and strategies for file striping, prefetching, and write behind; compilation strategies for out-of-core data access; scheduling and shared virtual memory alternatives; network support for low-latency data transfer; and parallel I/O application programming interfaces.
Author : Fadi Al-Turjman
Publisher : CRC Press
Page : 256 pages
File Size : 17,95 MB
Release : 2019-05-13
Category : Computers
ISBN : 0429513429
The Internet of Nano-Things (IoNT) is a system of nano-connected devices, objects, or organisms that have unique identifiers to transfer data over a computer or cellular network wirelessly to the Cloud. Data delivery, caching, and energy consumption are among the most significant topics in the IoNT nowadays. The book addresses data routing and energy consumption challenges and proposes nano-sensing platforms in critical Wireless Body Area Networks (WBAN). This book covers both design and implementation aspects of data delivery models and strategies in a smart application enabled by the WBAN. It focuses on smart data delivery approaches and energy savings aspects in a reliable IoNT systems.
Author : Markus Jakobsson
Publisher : Springer Science & Business Media
Page : 524 pages
File Size : 41,88 MB
Release : 2004-06
Category : Business & Economics
ISBN : 3540222170
This book constitutes the refereed proceedings of the Second International Conference on Applied Cryptography and Network Security, ACNS 2004, held in Yellow Mountain, China, in June 2004. The 36 revised full papers presented were carefully reviewed and selected from 297 submissions. The papers are organized in topical sections on security and storage, provably secure constructions, Internet security, digital signatures, security modeling, authenticated key exchange, security of deployed systems, cryptosystems design and analysis, cryptographic protocols, side channels and protocol analysis, intrusion detection and DoS, and cryptographic algorithms.