| |
For an accessible and comprehensive survey of telecommunications and data communications technologies and services, consult the Telecommunications and Data Communications Handbook, which includes information on origins, evolution and meaningful contemporary...
Editeur :
Wiley-Interscience
Parution :
2007-10-16
PDF
|
An increasing reliance on the Internet and mobile communication has deprived us of our usual means of assessing another party’s trustworthiness. This is increasingly forcing us to rely on control. Yet the notion of trust and trustworthiness is essential to the...
Editeur :
Wiley
Parution :
2007-09-27
PDF
|
The expected future evolution of mobile and wireless communication technologies will enable a whole new generation of mass-market-scale ubiquitous services and applications.The challenge now is to research and develop applications and services addressing the true needs...
Editeur :
Wiley
Parution :
2007-09-27
PDF
|
This book describes the technologies involved in all aspects of a large networking system and how the various devices can interact and communicate with each other. Using a bottom up approach the authors demonstrate how it is feasible, for instance, for a cellular device...
Editeur :
Wiley-IEEE Press
Parution :
2007-09-10
Collection :
Information and Communication Technology Series
PDF
|
Cognitive networks can dynamically adapt their operational parameters in response to user needs or changing environmental conditions. They can learn from these adaptations and exploit knowledge to make future decisions. Cognitive networks are the future, and they are...
Editeur :
Wiley-Interscience
Parution :
2007-08-20
PDF
|
A comprehensive reference on understanding, designing, and implementing IP Mobility This authoritative reference provides readers with a thorough understanding of IP Mobility using Mobile IPv6 and companion advanced mobility protocols including network mobility and...
Editeur :
Wiley-Interscience
Parution :
2007-07-30
PDF
|
The importance of quality of service (QoS) has risen with the recent evolution of telecommunication networks, which are characterised by a great heterogeneity. While many applications require a specific level of assurance from the network; communication networks are...
Editeur :
Wiley
Parution :
2007-04-30
PDF
|
"The new era of powerful, mobile computing and sensing devices having ever larger memories and personal databases brings to light a number of difficult problems in software, interface design, search, organization of information, and methods for inferring context and for...
Editeur :
Wiley-Interscience
Parution :
2007-04-30
PDF
|
Ambient Networks defines a new kind of network architecture, which embeds support for co operation and competition between diverse network types within a common control layer. This unified networking concept can adapt to the heterogeneous environments of different radio...
Editeur :
Wiley
Parution :
2007-04-30
PDF
|
Principles of Ad Hoc Networking presents a systematic introduction to the fundamentals of ad hoc networks. An ad-hoc network is a small network, especially one with wireless or temporary plug-in connections. Typically, some of the network devices are part of the...
Editeur :
Wiley
Parution :
2007-04-30
PDF
|
Step-by-step tutorial to master current design techniques for wireless communication systems The Third Edition of Radio System Design for Telecommunications brings this highly acclaimed book fully up to date with the latest technological advances and new applications....
Editeur :
Wiley-IEEE Press
Parution :
2007-04-18
Collection :
Wiley Series in Telecommunications and Signal Processing
PDF
|
How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude is changing rapidly....
Editeur :
Wiley
Parution :
2007-04-04
PDF
|
The Software Communications Architecture (SCA) establishes an implementation-independent framework for the development of Joint Tactical Radio System software configurable radios. It specifies the Operating Environment, services and interfaces that applications use. ...
Editeur :
Wiley
Parution :
2007-04-04
Collection :
Wiley Series in Software Radio
PDF
|
This book provides an introduction to RFID technology. It describes and addresses the following: How RFID works, how it is and can be used in current and future applications. The History of RFID technology, the current state of practice and where RFID is expected to be...
Editeur :
Wiley-Interscience
Parution :
2007-03-15
PDF
|
The present information age is enabled by telecommunications and information technology and the continued convergence of their services, technologies and business models. Within telecommunications, the historic separations between fixed networks, mobile telephone...
Editeur :
Wiley
Parution :
2007-03-13
PDF
|
|
|
Media Resource Control Protocol (MRCP) is a new IETF protocol, providing a key enabling technology that eases the integration of speech technologies into network equipment and accelerates their adoption resulting in exciting and compelling interactive services to be...
Editeur :
Wiley
Parution :
2007-03-13
PDF
|
For the first time the problems of voice services self-similarity are discussed systematically and in detail with specific examples and illustrations. Self-Similar Processes in Telecommunications considers the self-similar (fractal and multifractal) models of...
Editeur :
Wiley
Parution :
2007-03-13
PDF
|
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on...
Editeur :
Wiley-Interscience
Parution :
2007-02-26
PDF
|
This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future...
Editeur :
Wiley-Interscience
Parution :
2007-02-26
PDF
|