Managing Corporate Information Systems Evolution and Maintenance addresses the recent developments of systems maintenance research and practices ranging from technicality of systems evolution to managerial aspects of the topic. It includes very contemporary issues such as evolving legacy systems to e-business, applying patterns for reengineering legacy systems to web, architectural recovery of legacy systems, evolving legacy systems into software components. The book offers insight on how information systems evolution and maintenance could be initiated, managed, and engineered. The book is a...
Managing Corporate Information Systems Evolution and Maintenance addresses the recent developments of systems maintenance research and practices rangi...
RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware...
RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardwa...
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.
Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include...
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is ...
As Vehicular Networks technology enters a critical phase in its evolution, academic institutions, industry, and governments worldwide are investing significant resources into large-scale deployment of such networks in order to leverage its benefits to communication, road safety, and improved traffic flow. Despite the current proliferation of conferences to address the technical, policy, and economic challenges associated with this exciting new technology, notably absent is a self-contained book that integrates and covers these topics in sufficient detail.
Vehicular...
As Vehicular Networks technology enters a critical phase in its evolution, academic institutions, industry, and governments worldwide are investing...
Supported by the expert-level advice of pioneering researchers, Orthogonal Frequency Division Multiple Access Fundamentals and Applications provides a comprehensive and accessible introduction to the foundations and applications of one of the most promising access technologies for current and future wireless networks. It includes authoritative coverage of the history, fundamental principles, key techniques, and critical design issues of OFDM systems.
Covering various techniques of effective resource management for OFDM/OFDMA-based wireless communication...
Supported by the expert-level advice of pioneering researchers, Orthogonal Frequency Division Multiple Access Fundamentals and Application...
Cooperative devices and mechanisms are increasingly important to enhance the performance of wireless communications and networks, with their ability to decrease power consumption and packet loss rate and increase system capacity, computation, and network resilience. Considering the wide range of applications, strategies, and benefits associated with cooperative wireless communications, researchers and product developers need a succinct understanding of relevant theory, fundamentals, and techniques to navigate this challenging field. Cooperative Wireless Communications...
Cooperative devices and mechanisms are increasingly important to enhance the performance of wireless communications and networks, with their abilit...
Autonomic Computing and Networking presents introductory and advanced topics on autonomic computing and networking with emphasis on architectures, protocols, services, privacy & security, simulation and implementation testbeds. Autonomic computing and networking are new computing and networking paradigms that allow the creation of self-managing and self-controlling computing and networking environments using techniques such as distributed algorithms and context-awareness to dynamically control networking functions without human interventions. Autonomic networking is characterized by...
Autonomic Computing and Networking presents introductory and advanced topics on autonomic computing and networking with emphasis on architectures, ...
New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academicians, researchers, and professionals of this discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field. The Handbook of Research on Secure Multimedia Distribution provides the latest research on secure multimedia content distribution, embracing a wide variety of aspects and providing a scientifically and scholarly sound treatment of state-of-the-art techniques to students,...
New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academicians, resea...
This book studies data and knowledge transactions in mobile environments. A range of classical notions and protocols of transaction processing are rechecked and redefined in mobile environments. A relaxed serializability and a concurrency control method for mobile transactions are investigated. In addition to data transaction, knowledge transaction is explored in mobile environments. This book presents a knowledge transaction language and a model for use in mobile computing environments, and formalizes a framework/model that can be used to study knowledge transaction in mobile logic...
This book studies data and knowledge transactions in mobile environments. A range of classical notions and protocols of transaction processing are rec...
RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware...
RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardwa...