Driven by the increasing demand for capacity and Quality of Service in wireless cellular networks and motivated by the distributed antenna system, the authors proposed a cooperative communication architecture--Group Cell architecture, which was initially brought forward in 2001. Years later, Coordinated Multiple-Point Transmission and Reception (CoMP) for LTE-Advanced was put forward in April 2008, as a tool to improve the coverage of cells having high data rates, the cell-edge throughput and/or to increase system throughput. This book mainly focuses on the Group Cell architecture with...
Driven by the increasing demand for capacity and Quality of Service in wireless cellular networks and motivated by the distributed antenna system, the...
The subdisciplines of modelling, metamodelling, ontologies and modelling languages within software engineering have, to some degree, evolved separately and without any underpinning formalisms. This book introduces set theory as a consistent underlying formalism, and shows how a coherent framework can be developed that links these subdisciplines.
The subdisciplines of modelling, metamodelling, ontologies and modelling languages within software engineering have, to some degree, evolved separatel...
Investigates two-dimensional change detection methods. This title includes methods in the literature that are grouped into four categories: pixel-based, transformation-based, texture analysis-based, and structure-based. It provides the quantitative test results and their interpretations.
Investigates two-dimensional change detection methods. This title includes methods in the literature that are grouped into four categories: pixel-base...
In Ambient Intelligence (AmI) systems, reasoning is fundamental for triggering actions or adaptations according to specific situations that may be meaningful and relevant to some applications. However, such reasoning operations may need to evaluate context data collected from distributed sources and stored in different devices, as usually not all context data is readily available to the reasoners within the system.
"Decentralized Reasoning in Ambient Intelligence" proposes a decentralized reasoning approach for performing rule-based reasoning about context data targeting AmI systems....
In Ambient Intelligence (AmI) systems, reasoning is fundamental for triggering actions or adaptations according to specific situations that may be ...
Research in context-aware computing has produced a number of middleware systems for context management. This book proposes a novel architecture for context management based on the concept of context domains, allowing applications to keep context interests across distributed context management systems.
Research in context-aware computing has produced a number of middleware systems for context management. This book proposes a novel architecture for co...
The next-generation of wireless communications are envisioned to be supported by heterogeneous networks by using various wireless access technologies. The popular cellular networks and wireless local area networks (WLANs) present perfectly complementary characteristics in terms of service capacity, mobility support, and quality-of-service (QoS) provisioning. The cellular/WLAN interworking is an effective way to promote the evolution of wireless networks. Interworking of Wireless LANs and Cellular Networks focuses on three aspects, namely access selection, call admission control and load...
The next-generation of wireless communications are envisioned to be supported by heterogeneous networks by using various wireless access technologies....
Our knowledge of the surrounding world is obtained by our senses of perception. Among them, vision is undoubtedly the most important for the information it can provide. In artificial systems, this discipline, known as Computer Vision, mainly tries to identify physical objects and scenes from captured images to be able to make useful decisions. For that, the processing and analysis of images, video sequences, views from multiple cameras, or multi-dimensional data like a medical scanner, are carried out.
In this context, motion plays a main role since it provides a stimulus for...
Our knowledge of the surrounding world is obtained by our senses of perception. Among them, vision is undoubtedly the most important for the inform...
Automated Configuration has long been the subject of intensive research, especially in Artificial Intelligence. It is a pervasive problem to be solved, and it is a good test of various knowledge representation and reasoning techniques. The problem shows up in applications such as various electrical circuit design, utility computing and even concurrent engineering.
Automated Configuration Problem Solving defines the ubiquitous problem, illustrates the various solution techniques, and includes a survey using these techniques from the mid-70's until the mid-90's. During this...
Automated Configuration has long been the subject of intensive research, especially in Artificial Intelligence. It is a pervasive problem to be sol...
Traffic Measurement on the Internet presents several novel online measurement methods that are compact and fast. Traffic measurement provides critical real-world data for service providers and network administrations to perform capacity planning, accounting and billing, anomaly detection, and service provision. Statistical methods play important roles in many measurement functions including: system designing, model building, formula deriving, and error analyzing. One of the greatest challenges in designing an online measurement function is to minimize the per-packet processing time in...
Traffic Measurement on the Internet presents several novel online measurement methods that are compact and fast. Traffic measurement provides c...
Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary...
Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated ...