• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » Springerbriefs in Computer Science

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC
 
Collaborative Web Hosting: Challenges and Research Directions

Reaz Ahmed; Raouf Boutaba
This brief presents a peer-to-peer (P2P) web-hosting infrastructure (named pWeb) that can transform networked, home-entertainment devices into lightweight collaborating Web servers for persistently storing and serving multimedia and web content. The issues addressed include ensuring content availability, Plexus routing and indexing, naming schemes, web ID, collaborative web search, network architecture and content indexing. In pWeb, user-generated voluminous multimedia content is proactively uploaded to a nearby network location (preferably within the same LAN or at least, within the same...
This brief presents a peer-to-peer (P2P) web-hosting infrastructure (named pWeb) that can transform networked, home-entertainment devices into lightwe...
cena: 201,72
 
Jruby Rails Web Application Development

Deepak Vohra
This SpringerBrief explains how to create a Rails web application with JRuby, a 100% Java implementation for Ruby. This brief demonstrates how Oracle(R) WebLogic servers and JBoss(R) application servers deploy the JRuby application, how JRuby runs on the Java(R) Virtual Machine, and how JRuby is the basis for popular websites including LinkedIn, Oracle Mix, and Mingle. The Oracle(R) database and Oracle(R) MySQL database are used as the basis for the JRuby Rails application. Chapters also cover enabling Flash, developing the JRuby application using Ruby syntax, and deploying applications...
This SpringerBrief explains how to create a Rails web application with JRuby, a 100% Java implementation for Ruby. This brief demonstrates how Oracle(...
cena: 201,72
 
Security for Multi-Hop Wireless Networks

Mohamed M. E. a. Mahmoud; Xuemin (Sherman) Shen
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field....
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requiremen...
cena: 201,72
 
Network Hardening: An Automated Approach to Improving Network Security

Lingyu Wang; Massimiliano Albanese; Sushil Jajodia
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means of network defense than relying solely on the experience and skills of a human analyst. Key background information on attack graphs and network hardening helps readers understand the complexities of these tools and techniques. A common network hardening technique generates hardening solutions...
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack pa...
cena: 201,72
 
Modeling and Analysis of Voice and Data in Cognitive Radio Networks

Subodha Gunawardena; Weihua Zhuang
This Springer Brief investigates the voice and elastic/interactive data service support over cognitive radio networks (CRNs), in terms of their delay requirements. The increased demand for wireless communication conflicts with the scarcity of the radio spectrum, but CRNS allow for more efficient use of the networks. The authors review packet level delay requirements of the voice service and session level delay requirements of the elastic/interactive data services, particularly constant-rate and on-off voice traffic capacities in CRNs with centralized and distributed network...
This Springer Brief investigates the voice and elastic/interactive data service support over cognitive radio networks (CRNs), in terms of their delay ...
cena: 201,72
 
Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks

Shibo He; Jiming Chen; Junkun Li
This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover a variety of topics, including environmental surveillance and security monitoring. The authors also provide the background and range of applications for area coverage and elaborate on system models such as the formal definition of area coverage and sensing models. Several chapters focus on energy-efficient intruder detection and intruder trapping under the well-known binary sensing model, along with intruder trapping under the probabilistic...
This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover...
cena: 201,72
 
A Contrario Line Segment Detection

Rafael Grompone Von Gioi; Rafael Grompone Von Gioi
The reliable detection of low-level image structures is an old and still challenging problem in computer vision. This book leads a detailed tour through the LSD algorithm, a line segment detector designed to be fully automatic. Based on the a contrario framework, the algorithm works efficiently without the need of any parameter tuning. The design criteria are thoroughly explained and the algorithm's good and bad results are illustrated on real and synthetic images. The issues involved, as well as the strategies used, are common to many geometrical structure detection problems and some...
The reliable detection of low-level image structures is an old and still challenging problem in computer vision. This book leads a detailed tour throu...
cena: 201,72
 
Linear Network Error Correction Coding

Xuan Guang; Zhen Zhang
There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences similar to algebraic coding, and also briefly discuss the main results following the other approach, that uses the theory of rank metric codes for network error correction of representing messages by subspaces. This book starts by establishing the basic linear network error correction (LNEC) model and then characterizes two equivalent descriptions. Distances...
There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most importan...
cena: 201,72
 
Architectures of Small-Cell Networks and Interference Management

Duy Trong Ngo; Tho Le-Ngoc
This Springer Brief presents the architectures of small-cell networks and recent advances in interference management. The key challenges and values of small cells are first introduced, followed by the reviews of various small-cell architectures and interference management techniques in both heterogeneous CDMA and heterogeneous OFDMA small-cell networks. New adaptive power control and dynamic spectrum access techniques are discussed to promote a harmonized coexistence of diverse network entities in both 3G and 4G small-cell networks. Analytically devised from optimization and game theories,...
This Springer Brief presents the architectures of small-cell networks and recent advances in interference management. The key challenges and values of...
cena: 201,72
 
Distributed Context-Aware Systems

Paulo Ferreira; Pedro Alves
Context-aware systems aim to deliver a rich user experience by taking into account the current user context (location, time, activity, etc.), possibly captured without his intervention. For example, cell phones are now able to continuously update a user's location while, at the same time, users execute an increasing amount of activities online, where their actions may be easily captured (e.g. login in a web application) without user consent. In the last decade, this topic has seen numerous developments that demonstrate its relevance and usefulness. The trend was accelerated with the...
Context-aware systems aim to deliver a rich user experience by taking into account the current user context (location, time, activity, etc.), possibly...
cena: 201,72
ilość książek w kategorii: 352
Pierwsza Podprzednia  10  11  12  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia