Wireless Sensor Networks


Book Description

Written by award-winning engineers whose research has been sponsored by the U.S. National Science Foundation (NSF), IBM, and Cisco's University Research Program, Wireless Sensor Networks: Principles and Practice addresses everything product developers and technicians need to know to navigate the field. It provides an all-inclusive examina




Security and Privacy for Next-Generation Wireless Networks


Book Description

This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techniques in different emerging networks from the interconnection view of human and cyber-physical world. This book includes 7 chapters from prominent international researchers working in this subject area. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless security and privacy related issues Recent advances in wireless communication technologies have enabled the large-scale deployment of next-generation wireless networks, and many other wireless applications are emerging. The next generation of mobile networks continues to transform the way people communicate and access information. As a matter of fact, next-generation emerging networks are exploiting their numerous applications in both military and civil fields. For most applications, it is important to guarantee high security of the deployed network in order to defend against attacks from adversaries, as well as the privacy intrusion. The key target in the development of next-generation wireless networks is to promote the integration of the human, cyber, and physical worlds. Previous work in Cyber Physical Systems (CPS) considered the connection between the cyber world and the physical world. In the recent studies, human involvement brings new channels and initiatives in this interconnection. In this integration process, security and privacy are critical issues to many wireless network applications, and it is a paramount concern for the growth of next-generation wireless networks. This is due to the open nature of wireless communication and the involvement of humans. New opportunities for tackling these security and privacy issues in next-generation wireless networks will be achieved by leveraging the properties of interaction among human, computers and things.




Mobile Mapping Technologies


Book Description

Mobile Mapping technologies have seen a rapid growth of research activity and interest in the last years, due to the increased demand of accurate, dense and geo-referenced 3D data. Their main characteristic is the ability of acquiring 3D information of large areas dynamically. This versatility has expanded their application fields from the civil engineering to a broader range (industry, emergency response, cultural heritage...), which is constantly widening. This increased number of needs, some of them specially challenging, is pushing the Scientific Community, as well as companies, towards the development of innovative solutions, ranging from new hardware / open source software approaches and integration with other devices, up to the adoption of artificial intelligence methods for the automatic extraction of salient features and quality assessment for performance verification The aim of the present book is to cover the most relevant topics and trends in Mobile Mapping Technology, and also to introduce the new tendencies of this new paradigm of geospatial science.




Medical Imaging and Informatics


Book Description

This book constitutes the thoroughly refeered post-conference proceedings of the Second Interational Conference on Medical Imaging and Informatics, MIMI 2007, held in Beijing, China, in August 2007. The 40 revised full papers presented together with 4 keynote talks were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on medical image segmentation and registration, medical informatics, PET, fMRI, ultrasound and thermal imaging, 3D reconstruction and visualization. The volume is rounded off by 4 papers from 2 workshops on legal, ethical and social issues in medical imaging and informatics, as well as on computer-aided diagnosis (CAD).




Distributed Computing in Sensor Systems


Book Description

The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science research forum available. The scope of LNCS, including its subseries LNAI and LNBI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. In parallel to the printed book, each new volume is published electronically in LNCS Online.




VEE '07


Book Description




Security for Telecommunications Networks


Book Description

This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in computer science and electrical engineering.




Cyber Foraging


Book Description

This lecture provides an introduction to cyber foraging, a topic that lies at the intersection of mobile and cloud computing. Cyber foraging dynamically augments the computing resources of mobile computers by opportunistically exploiting fixed computing infrastructure in the surrounding environment. In a cyber foraging system, applications functionality is dynamically partitioned between the mobile computer and infrastructure servers that store data and execute computation on behalf of mobile users. The location of application functionality changes in response to user mobility, platform characteristics, and variation in resources such as network bandwidth and CPU load. Cyber foraging also introduces a new, surrogate computing tier that lies between mobile users and cloud data centers. Surrogates are wired, infrastructure servers that offer much greater computing resources than those offered by small, battery-powered mobile devices. Surrogates are geographically distributed to be as close as possible to mobile computers so that they can provide substantially better response time to network requests than that provided by servers in cloud data centers. For instance, surrogates may be co-located with wireless hotspots in coffee shops, airport lounges, and other public locations. This lecture first describes how cyber foraging systems dynamically partition data and computation. It shows how dynamic partitioning can often yield better performance, energy efficiency, and application quality than static thin-client or thick-client approaches for dividing functionality between cloud and mobile computers. The lecture then describes the design of the surrogate computing tier. It shows how strong isolation can enable third-party computers to host computation and store data on behalf of nearby mobile devices. It then describes how surrogates can provide reasonable security and privacy guarantees to the mobile computers that use them. The lecture concludes with a discussion of data staging, in which surrogates temporarily store data in transit between cloud servers and mobile computers in order to improve transfer bandwidth and energy efficiency. Table of Contents: Introduction / Partitioning / Management / Security and Privacy / Data Staging / Challenges and Opportunities




Location Systems


Book Description

Introduces researchers and developers to the most popular technologies and systems for location estimation and the challenges and opportunities that accompany their use. For each technology, the authors discuss the history of its development, the various systems that are based on it, and their trade-offs and their effects on cost and performance.