The Void Protocol


Book Description

In The Void Protocol, New York Times bestselling author F. Paul Wilson concludes his medical thriller trilogy featuring Rick Hayden and Laura Fanning as they confront the entities responsible for the supernatural events of Panacea and The God Gene. Something sits in a bunker lab buried fifty feet below the grounds of Lakehurst Naval Air Station. The product of the Lange-Tür technology confiscated from the Germans after World War II occupies a chamber of steel-reinforced ballistic glass. Despite experimentation for nearly three-quarters of a century, no one knows what it is, but illegal human research reveals what it can do. Humans with special abilities have been secretly collected—abilities that can only have come from whatever occupies the underground bunker in Lakehurst. And so it sits, sequestered on the edge of the New Jersey Pine Barrens, slowly changing the world. F. Paul Wilson is the winner of the Career Achievement in Thriller Fiction in the 2017 RT Reviewers' Choice Best Book Awards The ICE Sequence #1 Panacea #2 The God Gene #3 The Void Protocol




Wireless Algorithms, Systems, and Applications


Book Description

This book constitutes the refereed proceedings of the 4th Annual International Conference on Wireless Algorithms, Systems, and Applications, WASA 2009, held in Boston, MA, USA, in August 2009. The 36 revised full papers presented together with 15 invited papers and 7 workshop papers were carefully reviewed and selected from numerous submissions. Providing a forum for researchers and practitioners worldwide, the papers address current research and development efforts of various issues in the area of algorithms, systems and applications for current and next generation infrastructure and wireless networks. They are divided in topical sections on applications, experimentation, power management; coverage, detection, and topology control; routing, querying, and data collection; localization, security, and services; scheduling and resource management; and online social networks, applications, and systems.




Ad Hoc Networks


Book Description

This book constitutes the refereed proceedings of the 11th International Conference on Ad Hoc Networks, ADHOCNETS 2019, held in Queenstown, New Zealand, in November 2019. The 28 full papers were selected from 64 submissions and cover a variety of network paradigms including mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, airborne networks, underground networks, personal area networks, device-to-device (D2D) communications in 5G cellular networks, and home networks. The papers present a wide range of applications in civilian, commercial, and military areas.




Computing, Communication and Learning


Book Description

This volume constitutes the refereed proceedings of the First International Conference on Computing, Communication and Learning, CoCoLe 2022, held in Warangal, India, in October 2022. The 25 full papers and 1 short paper presented were carefully reviewed and selected from 117 submissions. The CoCoLe conference focuses on three broad areas of computer science and other allied branches, namely computing, communication, and learning.




Encyclopedia of Multimedia Technology and Networking, Second Edition


Book Description

Advances in hardware, software, and audiovisual rendering technologies of recent years have unleashed a wealth of new capabilities and possibilities for multimedia applications, creating a need for a comprehensive, up-to-date reference. The Encyclopedia of Multimedia Technology and Networking provides hundreds of contributions from over 200 distinguished international experts, covering the most important issues, concepts, trends, and technologies in multimedia technology. This must-have reference contains over 1,300 terms, definitions, and concepts, providing the deepest level of understanding of the field of multimedia technology and networking for academicians, researchers, and professionals worldwide.




Advances in Internet, Data & Web Technologies


Book Description

This book presents original contributions on the theories and practices of emerging Internet, data and Web technologies and their applicability in businesses, engineering and academia, focusing on advances in the life-cycle exploitation of data generated from the digital ecosystem data technologies that create value, e.g. for businesses, toward a collective intelligence approach. The Internet has become the most proliferative platform for emerging large-scale computing paradigms. Among these, data and web technologies are two of the most prominent paradigms and are found in a variety of forms, such as data centers, cloud computing, mobile cloud, and mobile Web services. These technologies together create a digital ecosystem whose cornerstone is the data cycle, from capturing to processing, analyzing and visualizing. The investigation of various research and development issues in this digital ecosystem are made more pressing by the ever-increasing requirements of real-world applications that are based on storing and processing large amounts of data. The book is a valuable resource for researchers, software developers, practitioners and students interested in the field of data and web technologies.




Ad-Hoc, Mobile, and Wireless Networks


Book Description

Here are the refereed proceedings of the 5th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2006, held in Ottawa, Canada, August 2006. The book presents 25 revised full papers and 10 revised short papers together with abstracts of 2 invited talks, in sections on routing in sensor networks, Routing in MANET, short papers on routing, security, wireless MAC, short papers on security, QoS and TCP, and upper layer issues.




The Internet and Its Protocols


Book Description

The view presented in The Internet and Its Protocols is at once broad and deep. It covers all the common protocols and how they combine to create the Internet in its totality. More importantly, it describes each one completely, examining the requirements it addresses and the exact means by which it does its job. These descriptions include message flows, full message formats, and message exchanges for normal and error operation. They are supported by numerous diagrams and tables.This book's comparative approach gives you something more valuable: insight into the decisions you face as you build and maintain your network, network device, or network application. Author Adrian Farrel’s experience and advice will dramatically smooth your path as you work to offer improved performance and a wider range of services. * Provides comprehensive, in-depth, and comparative coverage of the Internet Protocol (both IPv4 and IPv6) and its many related technologies.* Written for developers, operators, and managers, and designed to be used as both an overview and a reference.* Discusses major concepts in traffic engineering, providing detailed looks at MPLS and GMPLS and how they control both IP and non-IP traffic.* Covers protocols for governing routing and transport, and for managing switches, components, and the network as a whole, along with higher-level application protocols.* Offers thoughtful guidance on choosing between protocols, selecting features within a protocol, and other service- and performance-related decisions.




Security in RFID and Sensor Networks


Book Description

In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As always, adequate security remains one of the open are




Advances in Cryptology – ASIACRYPT 2022


Book Description

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.




Recent Books