Despite being the beating heart of our globalized digital society, the internet has not had a software upgrade since the early 1990s. This book argues for an overhaul and presents simple, effective protocols for building complex, self-organizing networks.
This book consists of a collection of works on utilizing the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods.
Company network administrators are compelled today to aggressively pursue a robust network security regime. This book aims to give a strong, multi-disciplinary understanding of how to pursue this goal by introducing the technical issues surrounding security.
This unique book provides a fascinating insight into the state-of-the-art in network science. It highlights the commonality across different areas of application and the ways in which each area can be advanced by injecting ideas and techniques from another.
This book presents queuing models for situations that require a reservation procedure and validate their applicability in the context of cable networks. It offers mathematical models to better understand the performance of these reservation procedures.
This book discusses characteristics and design elements required for wearable devices and systems to be embraced by the mainstream population in their everyday lives. Structured for researchers and practitioners in industry, it can also be used as a course text.
This book offers tools, modeling principles and state-of-the art
simulation models for discrete-event based network simulations. Wired and wireless networks and tools are each addressed in separate sections, and a variety of simulation engines are included.
This book addresses plan and intention recognition issues confronting mobile system engineers: how can we make mobile assistance systems more intelligent? How can we model and recognize patterns of human behavior which span more than a limited spatial context?