This brief presents a peer-to-peer (P2P) web-hosting infrastructure (named pWeb) that can transform networked, home-entertainment devices into lightweight collaborating Web servers for persistently storing and serving multimedia and web content. The issues addressed include ensuring content availability, Plexus routing and indexing, naming schemes, web ID, collaborative web search, network architecture and content indexing. In pWeb, user-generated voluminous multimedia content is proactively uploaded to a nearby network location (preferably within the same LAN or at least, within the same...
This brief presents a peer-to-peer (P2P) web-hosting infrastructure (named pWeb) that can transform networked, home-entertainment devices into lightwe...
This SpringerBrief explains how to create a Rails web application with JRuby, a 100% Java implementation for Ruby. This brief demonstrates how Oracle(R) WebLogic servers and JBoss(R) application servers deploy the JRuby application, how JRuby runs on the Java(R) Virtual Machine, and how JRuby is the basis for popular websites including LinkedIn, Oracle Mix, and Mingle. The Oracle(R) database and Oracle(R) MySQL database are used as the basis for the JRuby Rails application. Chapters also cover enabling Flash, developing the JRuby application using Ruby syntax, and deploying applications...
This SpringerBrief explains how to create a Rails web application with JRuby, a 100% Java implementation for Ruby. This brief demonstrates how Oracle(...
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field....
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requiremen...
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means of network defense than relying solely on the experience and skills of a human analyst. Key background information on attack graphs and network hardening helps readers understand the complexities of these tools and techniques. A common network hardening technique generates hardening solutions...
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack pa...
This Springer Brief investigates the voice and elastic/interactive data service support over cognitive radio networks (CRNs), in terms of their delay requirements. The increased demand for wireless communication conflicts with the scarcity of the radio spectrum, but CRNS allow for more efficient use of the networks. The authors review packet level delay requirements of the voice service and session level delay requirements of the elastic/interactive data services, particularly constant-rate and on-off voice traffic capacities in CRNs with centralized and distributed network...
This Springer Brief investigates the voice and elastic/interactive data service support over cognitive radio networks (CRNs), in terms of their delay ...
This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover a variety of topics, including environmental surveillance and security monitoring. The authors also provide the background and range of applications for area coverage and elaborate on system models such as the formal definition of area coverage and sensing models. Several chapters focus on energy-efficient intruder detection and intruder trapping under the well-known binary sensing model, along with intruder trapping under the probabilistic...
This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover...
The reliable detection of low-level image structures is an old and still challenging problem in computer vision. This book leads a detailed tour through the LSD algorithm, a line segment detector designed to be fully automatic. Based on the a contrario framework, the algorithm works efficiently without the need of any parameter tuning. The design criteria are thoroughly explained and the algorithm's good and bad results are illustrated on real and synthetic images. The issues involved, as well as the strategies used, are common to many geometrical structure detection problems and some...
The reliable detection of low-level image structures is an old and still challenging problem in computer vision. This book leads a detailed tour throu...
There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences similar to algebraic coding, and also briefly discuss the main results following the other approach, that uses the theory of rank metric codes for network error correction of representing messages by subspaces. This book starts by establishing the basic linear network error correction (LNEC) model and then characterizes two equivalent descriptions. Distances...
There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most importan...
This Springer Brief presents the architectures of small-cell networks and recent advances in interference management. The key challenges and values of small cells are first introduced, followed by the reviews of various small-cell architectures and interference management techniques in both heterogeneous CDMA and heterogeneous OFDMA small-cell networks. New adaptive power control and dynamic spectrum access techniques are discussed to promote a harmonized coexistence of diverse network entities in both 3G and 4G small-cell networks. Analytically devised from optimization and game theories,...
This Springer Brief presents the architectures of small-cell networks and recent advances in interference management. The key challenges and values of...
Context-aware systems aim to deliver a rich user experience by taking into account the current user context (location, time, activity, etc.), possibly captured without his intervention. For example, cell phones are now able to continuously update a user's location while, at the same time, users execute an increasing amount of activities online, where their actions may be easily captured (e.g. login in a web application) without user consent. In the last decade, this topic has seen numerous developments that demonstrate its relevance and usefulness. The trend was accelerated with the...
Context-aware systems aim to deliver a rich user experience by taking into account the current user context (location, time, activity, etc.), possibly...