Computer Performance Engineering


Book Description

This volume contains the proceedings of the 7th European Performance En- neering Workshop (EPEW 2010), held in Bertinoro, Italy, on September 23–24, 2010. The purpose of this workshop series is to gather academic and industrial researchers working on all aspects of performance engineering. This year the workshop was structured around three main areas: system and network p- formance engineering, software performance engineering, and the modeling and evaluation techniques supporting them. This edition of the workshop attracted 38 submissions, whose authors we wish to thank for their interest in EPEW 2010. After a careful review process during which every paper was refereed by at least three reviewers, the Program Committee selected 16 papers for presentation at the workshop. We warmly thank all the members of the ProgramCommittee and all the reviewersfor their fair and constructive comments and discussions. The workshop program was enriched by two keynote talks given by Marco Roccetti and Ralf Reussner. We conclude by expressing our gratitude to all the people who contributed to the organization of EPEW 2010, in particular the sta? of the University Residential Center of Bertinoro. We are also grateful to the EasyChair team for having allowed us to use their conference system and Springer for the continued editorial support of this workshop series.




Machine Learning for Computer and Cyber Security


Book Description

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.




Computer Performance Engineering


Book Description

This book constitutes the refereed proceedings of the 8th European Performance Engineering Workshop, EPEW 2011, held in The English Lake District in October 2011. The 16 regular papers and 6 poster presentations papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on performance-oriented design and analysis methods, model checking and validation, simulation techniques and experimental design, performability modelling and performance and power consumption tradeoffs.




Routing in Opportunistic Networks


Book Description

Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.




Mobile Ad Hoc Networks


Book Description

Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, this book examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Leading researchers, industry professionals, and academics provide an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service.




Security in Sensor Networks


Book Description

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practition




An Introduction to Communication Network Analysis


Book Description

A self-contained text on modeling and performance evaluation of communication networks This quantitative book focuses on the real issues behind modeling and analysis of communication networks. The author covers a wide variety of topical networking subject matter based on the provided background material in probability, Markov chains, and queues. Leveraging this material, the author explores topics in local multiplexing and routing over three successive chapters, stressing both continuous-time and discrete-time contexts. The remaining chapters focus more directly on networking, such as traffic shaping and multiplexing, static routing, dynamic routing, and peer-to-peer file sharing systems. Providing more rigorous and technically deep coverage than most commonly used networking textbooks, An Introduction to Communication Network Analysis covers classical (e.g., queuing theory) and modern (e.g., pricing) aspects of networking in a clear, accessible manner. Chapters include: * Review of Elementary Probability Theory * Markov Chains * Introduction to Queuing Theory * Local Multiplexing * Queuing Networks with Static Routing * Dynamic Routing with Incentives * Peer-to-Peer File Sharing with Incentives Appendices include additional background information, solutions, and references for selected problems, making this an invaluable text for graduate-level students and networking researchers alike.




Personal Satellite Services


Book Description

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Personal Satellite Services, PSATS 2013, held in Toulouse, France, in June 2013. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. They are grouped in the following topical sections: satellite for emergency and aero communication, satellite for networking, resource management, and air interface.




Internet of Things From Hype to Reality


Book Description

This book comprehensively describes an end-to-end Internet of Things (IoT) architecture that is comprised of devices, network, compute, storage, platform, applications along with management and security components. It is organized into five main parts, comprising of a total of 11 chapters. Part I presents a generic IoT reference model to establish a common vocabulary for IoT solutions. This includes a detailed description of the Internet protocol layers and the Things (sensors and actuators) as well as the key business drivers to realize the IoT vision. Part II focuses on the IoT requirements that impact networking protocols and provides a layer-by-layer walkthrough of the protocol stack with emphasis on industry progress and key gaps. Part III introduces the concept of Fog computing and describes the drivers for the technology, its constituent elements, and how it relates and differs from Cloud computing. Part IV discusses the IoT services platform, the cornerstone of the solution followed by the Security functions and requirements. Finally, Part V provides a treatment of the topic of connected ecosystems in IoT along with practical applications. It then surveys the latest IoT standards and discusses the pivotal role of open source in IoT. “Faculty will find well-crafted questions and answers at the end of each chapter, suitable for review and in classroom discussion topics. In addition, the material in the book can be used by engineers and technical leaders looking to gain a deep technical understanding of IoT, as well as by managers and business leaders looking to gain a competitive edge and understand innovation opportunities for the future.” Dr. Jim Spohrer, IBM “This text provides a very compelling study of the IoT space and achieves a very good balance between engineering/technology focus and business context. As such, it is highly-recommended for anyone interested in this rapidly-expanding field and will have broad appeal to a wide cross-section of readers, i.e., including engineering professionals, business analysts, university students, and professors.” Professor Nasir Ghani, University of South Florida




Recent Trends in Wireless and Mobile Networks


Book Description

This book constitutes the refereed proceedings of the Third International Conference on Wireless, Mobile Networks, WiMo 2011, and of The Third International Conference on Computer Networks and Communications, CoNeCo 2011, held in Ankara, Turkey, in June 2011. The 40 revised full papers presented were carefully reviewed and selected from 202 submissions.