With a focus on gaining an empirically derived understanding of the underlying psychological dimensions and processes behind people's experiences with technology, this book contributes to the debate of user experience (UX) within several disciplines, including HCI, design and marketing. It analyses UX dynamics at various time scales, and explores the very nature of time and meaning in the context of UX.
"Experience with Technology" uses personal construct theory (PCT) as a theoretical and methodological starting point to this project. Major case-studies are described that examine...
With a focus on gaining an empirically derived understanding of the underlying psychological dimensions and processes behind people's experiences w...
This brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service types, it presents several corresponding mechanisms which can ensure pricing implementation and resource allocation. The authors discuss utility optimization of network pricing methods in economics and underline two classes of pricing methods including system optimization and entities' strategic optimization. The brief closes with two examples of the newly proposed pricing strategy helping to solve the profit distribution problem brought by P2P...
This brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service...
This SpringerBrief provides an overview of cognitive mobile virtual network operator's (C-MVNO) decisions under investment flexibility, supply uncertainty, and market competition in cognitive radio networks. This is a new research area at the nexus of cognitive radio engineering and microeconomics. The authors focus on an operator's joint spectrum investment and service pricing decisions. The readers will learn how to tradeoff the two flexible investment choices (dynamic spectrum leasing and spectrum sensing) under supply uncertainty. Furthermore, if there is more than one operator, we...
This SpringerBrief provides an overview of cognitive mobile virtual network operator's (C-MVNO) decisions under investment flexibility, supply uncerta...
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11(TM) based wireless networks, IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia and industry. Due to the openness and distributed nature of the protocols involved, such as the session initiation protocol (SIP) and the IEEE 802:11(TM) standard, it becomes easy for malicious users in the network to achieve their own gain or disrupt the service by deviating from the normal protocol behaviors. This...
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11(TM) based wireles...
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users...
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes mu...
This brief examines resource allocation and interference management for 4G femtocells. It introduces 4G femtocells in the context of 4G mobile networks and discusses related technical challenges in resource allocation and interference management. Topics include ant colony algorithm based downlink resource allocation, intelligent scheduling and power control, uplink and downlink for two-tier networks, quality of service (QoS) constraints and the cross-tier interference constraint. The authors present algorithms to alleviate common femtocell-related problems such as subchannel power allocation....
This brief examines resource allocation and interference management for 4G femtocells. It introduces 4G femtocells in the context of 4G mobile network...
This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation...
This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant pictur...
This brief focuses on the current research on location privacy preservation in cognitive radio networks (CRNs). Along with a review of the existing works, this book includes fundamental privacy models, possible frameworks, useful performance, and future research directions. It explores privacy preservation techniques, collaborative spectrum sensing, database-driven CRNS, and modeling potential privacy threats. Conflicts between database owners and unlicensed users can compromise location privacy, and CRNs are a means to mitigate the spectrum scarcity issue due to the increasing demand for...
This brief focuses on the current research on location privacy preservation in cognitive radio networks (CRNs). Along with a review of the existing wo...
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to...
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods o...
This book explores the role of cancer stem cells in the diagnosis, treatment, and cure of cancers. This book also tackles novel methodology for cancer stem cell marker identification, cancer stem cell respiration and metabolism, genetic and epigenetic mechanisms including DNA methylation, and mi-RNA assemble. It also emphasizes the role of Bioinformatics techniques, which provide a novel methodology for modeling cancer outcomes.
The authors investigate the difference between cancer stem cells and normal stem cells, along with the concept of targeted cancer stem cell therapy....
This book explores the role of cancer stem cells in the diagnosis, treatment, and cure of cancers. This book also tackles novel methodology for can...