This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing such diverse topics as cloud computing, crowdsourcing platforms, vehicular ad-hoc networks, big data, mobile devices, location-based systems, smart grid technology, databases, social networks, healthcare, behavioral economics, and peer-to-peer networks. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned...
This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing such diverse topics as cl...
This timely text/reference presents a comprehensive review of the workflow scheduling algorithms and approaches that are rapidly becoming essential for a range of software applications, due to their ability to efficiently leverage diverse and distributed cloud resources. Particular emphasis is placed on how workflow-based automation in software-defined cloud centers and hybrid IT systems can significantly enhance resource utilization and optimize energy efficiency.
Topics and features: describes dynamic workflow and task scheduling techniques that work across multiple (on-premise and...
This timely text/reference presents a comprehensive review of the workflow scheduling algorithms and approaches that are rapidly becoming essential...
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions; What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications? It looks at the different goals organisations might have in...
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Informatio...
This monograph is concerned with the development and implementation of nonlinear mathematical techniques for feedback control and shape design of robot manipulators whose links have considerable structural flexibility. Several nonlinear control and observation techniques are studied and implemented by simulations and experiments in a laboratory setup. These techniques include integral manifolds in singular perturbation theory, nonlinear input-output decoupling, nonlinear observers and sliding control. The study of dynamic properties and control techniques for flexible-link manipulators can...
This monograph is concerned with the development and implementation of nonlinear mathematical techniques for feedback control and shape design of robo...
A second edition of this book has given me the opportunity to respond to suggestions from both students and correspondents from around the world, fromdisparateregionsrangingfromScotlandtoHawaii. Sincethe time of the ?rst edition written in the late 1990s, the Microchip PIC range has become the largest volume selling 8-bit MCU. The mid-range f- ily used in the original edition has continued to expand vigorously, with some of the exemplars used becoming essentially obsolete. In addition, the enhanced-range 16-bit instruction line has been enlarged from vir- ally nothing to form a signi?cant...
A second edition of this book has given me the opportunity to respond to suggestions from both students and correspondents from around the world, from...
Overview and Goals Wireless communication technologies are undergoing rapid advancements. The last few years have experienced a steep growth in research in the area of wireless mesh networks (WMNs). The attractiveness of WMNs, in general, is attributed to their characteristics such as the ability to dynamically self-organize and self-con?gure, coupled with the ability to maintain mesh connectivity leading, in effect, to low set-up/installation costs, simpler maintenance tasks, and service coverage with high reliability and fault-tolerance. WMNs also support their integration with existing...
Overview and Goals Wireless communication technologies are undergoing rapid advancements. The last few years have experienced a steep growth in resear...
Overview and Goals Wireless communication technologies are undergoing rapid advancements. The past few years have experienced a steep growth in research in the area of wireless ad hoc networks. The attractiveness of ad hoc networks, in general, is attributed to their characteristics/features such as ability for infrastructure-less setup, minimal or no reliance on network planning and the ability of the nodes to self-organize and self-configure without the involvement of a centralized n- work manager, router, access point or a switch. These features help to set up a network fast in situations...
Overview and Goals Wireless communication technologies are undergoing rapid advancements. The past few years have experienced a steep growth in resear...