• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » Wireless Networks

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC
 
Cloud Networking for Big Data

Deze Zeng; Lin Gu; Song Guo

This book introduces two basic big data processing paradigms for batch data and streaming data. Representative programming frameworks are also presented, as well as software defined networking (SDN) and network function virtualization (NFV) technologies as key cloud networking technologies.

The authors illustrate that SDN and NFV can be applied to benefit the big data processing by proposing a cloud networking framework. Based on the framework, two case studies examine how to improve the cost efficiency of big data processing.

Cloud Networking for Big Data

targets...

This book introduces two basic big data processing paradigms for batch data and streaming data. Representative programming frameworks are also pres...

cena: 201,72
 
Security and Privacy for Mobile Healthcare Networks

Kuan Zhang; Xuemin (Sherman) Shen

This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and privacy for MHNs. Critical future challenges and research problems are also identified.

Using a Quality-of-Protection perspective, the authors provide valuable insights on security and privacy preservation for MHNs. Some promising solutions are proposed to accommodate the issues of secure health data transmission,...

This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobi...

cena: 201,72
 
Mobile Electric Vehicles: Online Charging and Discharging

Miao Wang; Ran Zhang; Xuemin (Sherman) Shen

This book examines recent research on designing online charging and discharging strategies for mobile electric vehicles (EVs) in smart grid. First, the architecture and applications are provided. Then, the authors review the existing works on charging and discharging strategy design for EVs. Critical challenges and research problems are identified. Promising solutions are proposed to accommodate the issues of high EV mobility, vehicle range anxiety, and power systems overload.

The authors investigate innovating charging and discharging potentials for mobile EVS based on real-time...

This book examines recent research on designing online charging and discharging strategies for mobile electric vehicles (EVs) in smart grid. First,...

cena: 403,47
 
Security in Network Coding

Peng Zhang; Chuang Lin
This book covers a series of security and privacy issues in network coding, and introduces three concrete mechanisms to address them. These mechanisms leverage traditional cryptographic primitives and anonymous protocols, and are redesigned to fit into the new framework of network coding. These three mechanisms are MacSig, a new message authentication method for network-coded systems; P-Coding, a new encryption scheme to secure network-coding-based transmissions; and ANOC, a new anonymous routing protocol that seamlessly integrates anonymous routing with network coding.
Along with these...
This book covers a series of security and privacy issues in network coding, and introduces three concrete mechanisms to address them. These mechanisms...
cena: 443,82
 
Moving Target Defense for Distributed Systems

Sachin Shetty; Xuebiao Yuchi; Min Song
This book provides an overview of Moving Target Defense (MTD) and the importance of developing novel MTD schemes to protect distributed systems. It presents MTD-based research efforts to protect cloud data centers, along with network and security risk-aware approaches to place Virtual Machines (VM) in cloud data centers. These approaches include MTD-based network diversity models that enable an evaluation of the robustness of cloud data centers against potential zero-day attacks. Since these models can be used as a security metric the authors include different network configurations and...
This book provides an overview of Moving Target Defense (MTD) and the importance of developing novel MTD schemes to protect distributed systems. It pr...
cena: 201,72
 
Physical-Layer Security for Cooperative Relay Networks

Yulong Zou; Jia Zhu
This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters...
This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It ...
cena: 403,47
 
Cooperative Ofdm Underwater Acoustic Communications

Xilin Cheng; Liuqing Yang; Xiang Cheng
Following underwater acoustic channel modeling, this book investigates the relationship between coherence time and transmission distances. It considers the power allocation issues of two typical transmission scenarios, namely short-range transmission and medium-long range transmission. For the former scenario, an adaptive system is developed based on instantaneous channel state information. The primary focus is on cooperative dual-hop orthogonal frequency division multiplexing (OFDM).This book includes the decomposed fountain codes designed to enable reliable communications with higher energy...
Following underwater acoustic channel modeling, this book investigates the relationship between coherence time and transmission distances. It consider...
cena: 484,18
 
Privacy-Enhancing Aggregation Techniques for Smart Grid Communications

Rongxing Lu
This book provides an overview of security and privacy issues in smart grid communications, as well as the challenges in addressing these issues. It also introduces several privacy enhancing aggregation techniques including multidimensional data aggregation, subset data aggregation, multifunctional data aggregation, data aggregation with fault tolerance, data aggregation with differential privacy, and data aggregation with integrity protection. Offering a comprehensive exploration of various privacy preserving data aggregation techniques, this book is an exceptional resource for the...
This book provides an overview of security and privacy issues in smart grid communications, as well as the challenges in addressing these issues. It a...
cena: 403,47
 
Economics of Database-Assisted Spectrum Sharing

Yuan Luo; Lin Gao; Jianwei Huang
This book examines the interaction between the technical and economic issues in database-assisted dynamic spectrum networks. It explains various business models for different network settings, analyzing the user behaviors and system equilibrium under each model.
With the explosive growth of mobile devices and bandwidth-hungry applications, radio spectrum is becoming increasingly congested and scarce. Database-assisted dynamic spectrum sharing is a promising technology for solving the problem of spectrum scarcity and congestion by allowing unlicensed mobile devices to dynamically access...
This book examines the interaction between the technical and economic issues in database-assisted dynamic spectrum networks. It explains various busin...
cena: 201,72
 
Safety Message Broadcast in Vehicular Networks

Yuanguo Bi; Haibo Zhou; Weihua Zhuang
This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast.
This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for ...
cena: 403,47
ilość książek w kategorii: 163
 1  2  3  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia