Opportunistic networks forms one of the two major categories of multi-hop ad hoc networks, which are widely used in many scenarios. Applications on opportunistic networks have been on mobile network, space networks, online social networks, and underwater networks, etc. This book introduces opportunistic networking combining fundamental mathematical models, system architecture protocols, and practical applications. The book summarizes the main outcomes and investigation of opportunistic networks and provides the overview picture and system training for newcomers to this promising area.
Opportunistic networks forms one of the two major categories of multi-hop ad hoc networks, which are widely used in many scenarios. Applications on...
The two-volume set LNICST 150 and 151 constitutes the thoroughly refereed post-conference proceedings of the First International Internet of Things Summit, IoT360 2014, held in Rome, Italy, in October 2014.
This volume contains 30 revised full papers carefully reviewed and selected from 51 submissions at the following three conferences: the First International Conference on Mobility and Smart Cities, Mobility IoT 2014; the First International Conference on Software-Defined and Virtualized Future Wireless Networks, SDWN 2014; and the First International Conference on Safety and...
The two-volume set LNICST 150 and 151 constitutes the thoroughly refereed post-conference proceedings of the First International Internet of Things...
The book collects new research ideas and achievements including adelay-dependent robust design method, a wide area robust coordination strategy,a hybrid assessment and choice method for wide area signals, a free-weightingmatrices method and its application, as well as the online identificationmethods for low-frequency oscillations.
The book collects new research ideas and achievements including adelay-dependent robust design method, a wide area robust coordination strategy,a hybr...
This book is intended for compliance professionals, IT professionals, and business stakeholders who are working on anti-money laundering (AML) or financial crime risk management information systems implementation. This book focuses on the AML information systems technical implementation, especially the implementation/project planning, and current state, future state, gap analysis, as well some technical solutions and practical approaches. Most topics discussed in this book are for banks in the United States and Canada, but the principles and frameworks mentioned in the book could also be...
This book is intended for compliance professionals, IT professionals, and business stakeholders who are working on anti-money laundering (AML) or fina...