Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications networks were the first concretization of mobile telephony, followed by a set of wireless technologies with or without embedded mobility and with or without infrastructure. Obviously, this large deployment of services over mobile and wireless networks is not
Wireless communication systems --- Telecommunication systems. --- Communication systems --- Communications systems --- Systems, Communication --- Electronic systems --- Telecommunication --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- Security measures
Choose an application
Wireless LANs --- Wireless communication systems --- Computer networks --- Cryptography. --- Digital watermarking. --- Réseaux locaux sans fil --- Transmission sans fil --- Réseaux d'ordinateurs --- Cryptographie --- Filigranes numériques --- Security measures --- Safety measures --- Sécurité --- Mesures --- Sécurité--Mesures
Choose an application
Fourth-generation (4G) or long-term evolution (LTE) technology offers the promise of even smarter computing and multimedia applications which will be available anywhere, at any time. This comprehensive text/reference presents a detailed review of the pioneering research underpinning this emerging technological revolution. The book also examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Opening with a selection of chapters devoted to the exciting trends in wireless network technology, followed by a section focusing on advanced applications, the text then concludes with an investigation into the future internet systems that will pave the way towards true ubiquitous computing. Topics and features: Presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies Discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE Examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications Introduces developments towards the ‘Internet of Things’ from both a communications and a service perspective Discusses the machine-to-machine communication model, important applications of wireless technologies in healthcare, and security issues in state-of-the-art networks This wide-ranging, cutting-edge volume is a ‘must-read’ for all researchers and practitioners involved in wireless communications. Dr. Naveen Chilamkurti is a Senior Lecturer in the Department of Computer Science and Engineering at La Trobe University, Melbourne, Australia. Dr. Sherali Zeadally is an Associate Professor in the Department of Computer Science and Information Technology at the University of the District of Columbia, USA. Dr. Hakima Chaouchi is an Associate Professor at Telecom SudParis, France.
Computer communication networks. --- Computer science. --- Wireless communication systems -- Technological innovations. --- Wireless communication systems --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Technological innovations --- Information Technology --- Computer Science (Hardware & Networks) --- Wireless communication systems. --- Wireless internet. --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Computer communication systems. --- Computer Science. --- Computer Communication Networks. --- Internet --- Telecommunication systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Technological innovations. --- Wireless Internet.
Choose an application
Fourth-generation (4G) or long-term evolution (LTE) technology offers the promise of even smarter computing and multimedia applications which will be available anywhere, at any time. This comprehensive text/reference presents a detailed review of the pioneering research underpinning this emerging technological revolution. The book also examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Opening with a selection of chapters devoted to the exciting trends in wireless network technology, followed by a section focusing on advanced applications, the text then concludes with an investigation into the future internet systems that will pave the way towards true ubiquitous computing. Topics and features: Presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies Discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE Examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications Introduces developments towards the ‘Internet of Things’ from both a communications and a service perspective Discusses the machine-to-machine communication model, important applications of wireless technologies in healthcare, and security issues in state-of-the-art networks This wide-ranging, cutting-edge volume is a ‘must-read’ for all researchers and practitioners involved in wireless communications. Dr. Naveen Chilamkurti is a Senior Lecturer in the Department of Computer Science and Engineering at La Trobe University, Melbourne, Australia. Dr. Sherali Zeadally is an Associate Professor in the Department of Computer Science and Information Technology at the University of the District of Columbia, USA. Dr. Hakima Chaouchi is an Associate Professor at Telecom SudParis, France.
Computer science --- Computer architecture. Operating systems --- draadloze computernetwerken --- RFID (radio frequentiële identificatie) --- IoT (Internet of Things) --- computers --- multimedia --- computernetwerken --- computerkunde --- Wireless communication systems. --- Wireless Internet.
Choose an application
This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016. The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the latest research findings in the area of Internet of Things (IoT).
Computer science. --- Computer communication systems. --- Special purpose computers. --- Software engineering. --- Computer security. --- Computer Science. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Security. --- Software Engineering. --- Special Purpose and Application-Based Systems. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer software engineering --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Engineering --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Distributed processing --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Internet of things --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed post-conference proceedings of the Third International Conference on Interoperability, InterIoT 2017, which was collocated with SaSeIoT 2017, and took place in Valencia, Spain, in November 2017. The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the latest research findings in the area of Internet of Things (IoT).
Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Artificial intelligence. --- Computer Science. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Data Encryption. --- Systems and Data Security. --- Artificial Intelligence (incl. Robotics). --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Artificial Intelligence. --- Internet of things --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed post-conference proceedings of the Third International Conference on Interoperability, InterIoT 2017, which was collocated with SaSeIoT 2017, and took place in Valencia, Spain, in November 2017. The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the latest research findings in the area of Internet of Things (IoT).
Programming --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- cryptografie --- IoT (Internet of Things) --- informatica --- informatiesystemen --- computerbeveiliging --- KI (kunstmatige intelligentie) --- computernetwerken --- AI (artificiële intelligentie)
Choose an application
This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016. The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the latest research findings in the area of Internet of Things (IoT).
Production management --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- veiligheid (mensen) --- IoT (Internet of Things) --- informatica --- informatiesystemen --- software engineering --- computerbeveiliging --- computernetwerken
Choose an application
The two-volume set LNICST 169 and 170 constitutes the thoroughly refereed post-conference proceedings of the Second International Internet of Things Summit, IoT 360° 2015, held in Rome, Italy, in October 2015. The IoT 360° is an event bringing a 360 degree perspective on IoT-related projects in important sectors such as mobility, security, healthcare and urban spaces. The conference also aims to coach involved people on the whole path between research to innovation and the way through to commercialization in the IoT domain. This volume contains 61 revised full papers at the following four conferences: International Conference on IoT as a Service, IoTaaS, International Conference on Mobility in IoT, Mobility IoT, International Conference on Sensor Systems and Software, S-Cube, International Conference on Interoperability in IoT, InterioT, International Conference on Software Defined and Virtual Future Wireless Networks, SDWNCT.
Computer science. --- Computer communication systems. --- Special purpose computers. --- Software engineering. --- User interfaces (Computer systems). --- Computer Science. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- User Interfaces and Human Computer Interaction. --- Information Systems Applications (incl. Internet). --- Software Engineering. --- Interfaces, User (Computer systems) --- Computer software engineering --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Human-machine systems --- Human-computer interaction --- Engineering --- Computers --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Distributed processing --- Internet of things --- Reliability. --- Computer reliability --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
The two-volume set LNICST 169 and 170 constitutes the thoroughly refereed post-conference proceedings of the Second International Internet of Things Summit, IoT 360° 2015, held in Rome, Italy, in October 2015. The IoT 360° is an event bringing a 360 degree perspective on IoT-related projects in important sectors such as mobility, security, healthcare and urban spaces. The conference also aims to coach involved people on the whole path between research to innovation and the way through to commercialization in the IoT domain. This volume contains 62 revised full papers at the following four conferences: The International Conference on Safety and Security in Internet of Things, SaSeIoT, the International Conference on Smart Objects and Technologies for Social Good, GOODTECHS, the International Conference on Cloud, Networking for IoT systems, CN4IoT, and the International Conference on IoT Technologies for HealthCare, HealthyIoT.
Computer science. --- Computer communication systems. --- Special purpose computers. --- Software engineering. --- User interfaces (Computer systems). --- Computer Science. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- User Interfaces and Human Computer Interaction. --- Information Systems Applications (incl. Internet). --- Software Engineering. --- Interfaces, User (Computer systems) --- Computer software engineering --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Human-machine systems --- Human-computer interaction --- Engineering --- Computers --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Distributed processing --- Internet of things --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Listing 1 - 10 of 12 | << page >> |
Sort by
|