Télécharger le livre :  Security and Privacy in Mobile Social Networks
Ajouter à ma liste d'envies
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two...

Editeur : Springer
Parution : 2013-10-12
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Distributed Hash Table
Ajouter à ma liste d'envies
This SpringerBrief summarizes the development of Distributed Hash Table in both academic and industrial fields. It covers the main theory, platforms and applications of this key part in distributed systems and applications, especially in large-scale distributed...

Editeur : Springer
Parution : 2013-10-08
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Sustainable Wireless Networks
Ajouter à ma liste d'envies
This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for...

Editeur : Springer
Parution : 2013-10-07
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Cyber Security
Ajouter à ma liste d'envies
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on...

Editeur : Springer
Parution : 2013-10-04
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Cognitive Virtual Network Operator Games
Ajouter à ma liste d'envies
This SpringerBrief provides an overview of cognitive mobile virtual network operator’s (C-MVNO) decisions under investment flexibility, supply uncertainty, and market competition in cognitive radio networks.This is a new research area at the nexus of cognitive radio...

Editeur : Springer
Parution : 2013-10-04
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  4G Femtocells
Ajouter à ma liste d'envies
This brief examines resource allocation and interference management for 4G femtocells. It introduces 4G femtocells in the context of 4G mobile networks and discusses related technical challenges in resource allocation and interference management. Topics include ant...

Editeur : Springer
Parution : 2013-10-01
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
Ajouter à ma liste d'envies
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks,IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia...

Editeur : Springer
Parution : 2013-09-27
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Data Center Networks
Ajouter à ma liste d'envies
This SpringerBrief presents a survey of data center network designs and topologies and compares several properties in order to highlight their advantages and disadvantages. The brief also explores several routing protocols designed for these topologies and compares the...

Editeur : Springer
Parution : 2013-09-26
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  A Brief History of Cryptology and Cryptographic Algorithms
Ajouter à ma liste d'envies
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems.The conflict between these two halves of cryptology is the story of secret writing....

Editeur : Springer
Parution : 2013-09-24
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Middleware Solutions for the Internet of Things
Ajouter à ma liste d'envies
After a brief introduction and contextualization on the Internet of Things (IoT) and Web of Things (WoT) paradigms, this timely new book describes one of the first research initiatives aimed at tackling the several challenges involved in building a middleware-layer...

Editeur : Springer
Parution : 2013-09-21
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Experience with Technology
Ajouter à ma liste d'envies
With a focus on gaining an empirically derived understanding of the underlying psychological dimensions and processes behind people’s experiences with technology, this book contributes to the debate of user experience (UX) within several disciplines, including HCI,...

Editeur : Springer
Parution : 2013-09-16
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Data Mining Techniques in Sensor Networks
Ajouter à ma liste d'envies
Sensor networks comprise of a number of sensors installed across a spatially distributed network, which gather information and periodically feed a central server with the measured data. The server monitors the data, issues possible alarms and computes fast aggregates....

Editeur : Springer
Parution : 2013-09-12
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Vision-based Pedestrian Protection Systems for Intelligent Vehicles
Ajouter à ma liste d'envies
Pedestrian Protection Systems (PPSs) are on-board systems aimed at detecting and tracking people in the surroundings of a vehicle in order to avoid potentially dangerous situations. These systems, together with other Advanced Driver Assistance Systems (ADAS) such as...

Editeur : Springer
Parution : 2013-08-31
Collection : SpringerBriefs in Computer Science
ePub

42,19
Télécharger le livre :  Wireless Virtualization
Ajouter à ma liste d'envies
This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures,...

Editeur : Springer
Parution : 2013-08-28
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Secure IP Mobility Management for VANET
Ajouter à ma liste d'envies
This brief presents the challenges and solutions for VANETs’ security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the...

Editeur : Springer
Parution : 2013-08-28
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Trustworthy Execution on Mobile Devices
Ajouter à ma liste d'envies
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated...

Editeur : Springer
Parution : 2013-08-13
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Internet Resource Pricing Models
Ajouter à ma liste d'envies
This brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service types, it presents several corresponding mechanisms which can ensure pricing implementation and resource allocation....

Editeur : Springer
Parution : 2013-08-13
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Mobile Web Browsing Using the Cloud
Ajouter à ma liste d'envies
This brief surveys existing techniques to address the problem of long delays and high power consumption for web browsing on smartphones, which can be due to the local computational limitation at the smartphone (e.g., running java scripts or flash objects) level. To...

Editeur : Springer
Parution : 2013-07-22
Collection : SpringerBriefs in Computer Science
ePub

42,19
Télécharger le livre :  Resource Management for Device-to-Device Underlay Communication
Ajouter à ma liste d'envies
Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral...

Editeur : Springer
Parution : 2013-07-17
Collection : SpringerBriefs in Computer Science
ePub

42,19
Télécharger le livre :  Security for Cloud Storage Systems
Ajouter à ma liste d'envies
Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data...

Editeur : Springer
Parution : 2013-07-01
Collection : SpringerBriefs in Computer Science
ePub

42,19
<< < 1112131415 >