Browse Results

Showing 48,951 through 48,975 of 62,782 results

Resilience Assessment and Evaluation of Computing Systems

by Katinka Wolter Aad Van Moorsel Alberto Avritzer Marco Vieira

The resilience of computing systems includes their dependability as well as their fault tolerance and security. It defines the ability of a computing system to perform properly in the presence of various kinds of disturbances and to recover from any service degradation. These properties are immensely important in a world where many aspects of our daily life depend on the correct, reliable and secure operation of often large-scale distributed computing systems. Wolter and her co-editors grouped the 20 chapters from leading researchers into seven parts: an introduction and motivating examples, modeling techniques, model-driven prediction, measurement and metrics, testing techniques, case studies, and conclusions. The core is formed by 12 technical papers, which are framed by motivating real-world examples and case studies, thus illustrating the necessity and the application of the presented methods. While the technical chapters are independent of each other and can be read in any order, the reader will benefit more from the case studies if he or she reads them together with the related techniques. The papers combine topics like modeling, benchmarking, testing, performance evaluation, and dependability, and aim at academic and industrial researchers in these areas as well as graduate students and lecturers in related fields. In this volume, they will find a comprehensive overview of the state of the art in a field of continuously growing practical importance.

Resilience and Reliability on AWS: Engineering at Cloud Scale

by Jurg Van Vliet Flavia Paganelli Jasper Geurtsen

Cloud services are just as susceptible to network outages as any other platform. This concise book shows you how to prepare for potentially devastating interruptions by building your own resilient and reliable applications in the public cloud. Guided by engineers from 9apps—an independent provider of Amazon Web Services and Eucalyptus cloud solutions—you’ll learn how to combine AWS with open source tools such as PostgreSQL, MongoDB, and Redis.This isn’t a book on theory. With detailed examples, sample scripts, and solid advice, software engineers with operations experience will learn specific techniques that 9apps routinely uses in its cloud infrastructures.Build cloud applications with the "rip, mix, and burn" approachGet a crash course on Amazon Web ServicesLearn the top ten tips for surviving outages in the cloudUse elasticsearch to build a dependable NoSQL data storeCombine AWS and PostgreSQL to build an RDBMS that scales wellCreate a highly available document database with MongoDB Replica Set and SimpleDBAugment Redis with AWS to provide backup/restore, failover, and monitoring capabilitiesWork with CloudFront and Route 53 to safeguard global content delivery

Resilience and Risk

by Igor Linkov José Manuel Palma-Oliveira

This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry, government and academia in the new and emerging field of resilience in order to provide a more comprehensive and universal understanding of how resilience methodology can be applied in various disciplines and applications. This book advocates for a systems-driven view of resilience in applications ranging from cyber security to ecology to social action, and addresses resilience-based management in infrastructure, cyber, social domains and methodology and tools. Risk and Resilience has been written to open up a transparent dialog on resilience management for scientists and practitioners in all relevant academic disciplines and can be used as supplement in teaching risk assessment and management courses.

Resilience in the Digital Age (Lecture Notes in Computer Science #12660)

by Fred S. Roberts Igor A. Sheremet

The growth of a global digital economy has enabled rapid communication, instantaneous movement of funds, and availability of vast amounts of information. With this come challenges such as the vulnerability of digitalized sociotechnological systems (STSs) to destructive events (earthquakes, disease events, terrorist attacks). Similar issues arise for disruptions to complex linked natural and social systems (from changing climates, evolving urban environments, etc.). This book explores new approaches to the resilience of sociotechnological and natural-social systems in a digital world of big data, extraordinary computing capacity, and rapidly developing methods of Artificial Intelligence. Most of the book’s papers were presented at the Workshop on Big Data and Systems Analysis held at the International Institute for Applied Systems Analysis in Laxenburg, Austria in February, 2020. Their authors are associated with the Task Group “Advanced mathematical tools for data-driven applied systems analysis” created and sponsored by CODATA in November, 2018. The world-wide COVID-19 pandemic illustrates the vulnerability of our healthcare systems, supply chains, and social infrastructure, and confronts our notions of what makes a system resilient. We have found that use of AI tools can lead to problems when unexpected events occur. On the other hand, the vast amounts of data available from sensors, satellite images, social media, etc. can also be used to make modern systems more resilient. Papers in the book explore disruptions of complex networks and algorithms that minimize departure from a previous state after a disruption; introduce a multigrammatical framework for the technological and resource bases of today’s large-scale industrial systems and the transformations resulting from disruptive events; and explain how robotics can enhance pre-emptive measures or post-disaster responses to increase resiliency. Other papers explore current directions in data processing and handling and principles of FAIRness in data; how the availability of large amounts of data can aid in the development of resilient STSs and challenges to overcome in doing so. The book also addresses interactions between humans and built environments, focusing on how AI can inform today’s smart and connected buildings and make them resilient, and how AI tools can increase resilience to misinformation and its dissemination.

Resilience of Cyber-Physical Systems: From Risk Modelling To Threat Counteraction (Advanced Sciences and Technologies for Security Applications)

by Francesco Flammini

This book addresses the latest approaches to holistic Cyber-Physical System (CPS) resilience in real-world industrial applications. Ensuring the resilience of CPSs requires cross-discipline analysis and involves many challenges and open issues, including how to address evolving cyber-security threats. The book describes emerging paradigms and techniques from two main viewpoints: CPSs’ exposure to new threats, and CPSs’ potential to counteract them. Further, the chapters address topics ranging from risk modeling to threat management and mitigation. The book offers a clearly structured, highly accessible resource for a diverse readership, including graduate students, researchers and industry practitioners who are interested in evaluating and ensuring the resilience of CPSs in both the development and assessment stages. Foreword by Prof. Shiyan Hu, Chair of Cyber-Physical Systems at Linnaeus University, Sweden.

Resilient Computer System Design

by Igor Schagaev Victor Castano

This book presents a paradigm for designing new generation resilient and evolving computer systems, including their key concepts, elements of supportive theory, methods of analysis and synthesis of ICT with new properties of evolving functioning, as well as implementation schemes and their prototyping. The book explains why new ICT applications require a complete redesign of computer systems to address challenges of extreme reliability, high performance, and power efficiency. The authors present a comprehensive treatment for designing the next generation of computers, especially addressing safety critical, autonomous, real time, military, banking, and wearable health care systems.

Resilient Control of Intelligent Connected Vehicle Platoon Systems

by Yong Chen Chengwei Pan

The book focuses on the design of resilient control schemes for intelligent connected vehicle platoon systems. The issues of physical faults, malicious cyber-attacks and external disturbances are studied from the perspective of resilient control. The contents of this book introduce a variety of control schemes in detail, and give simulation or experimental verification cases. To enable readers to learn the resilient control methods of vehicle platoon systems is the main benefit of this book. Meanwhile, this book also benefits researchers, engineers, graduate students in related fields such as nonlinear control, robust control, resilient control, vehicle platoon control, etc.

Resilient Cybersecurity: Reconstruct your defense strategy in an evolving cyber world

by Mark Dunkerley

Build a robust cybersecurity program that adapts to the constantly evolving threat landscapeKey FeaturesGain a deep understanding of the current state of cybersecurity, including insights into the latest threats such as Ransomware and AILay the foundation of your cybersecurity program with a comprehensive approach allowing for continuous maturityEquip yourself with the strategies needed to build and manage an effective cybersecurity programBook DescriptionBuilding a Comprehensive Cybersecurity Program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively. Readers will gain insights into the current state of the cybersecurity landscape, understanding the evolving threats and the challenges posed today. This book emphasizes the importance of prioritizing well-being within the cybersecurity profession, addressing a concern often overlooked in the industry. You will construct a cybersecurity program that encompasses cybersecurity architecture, identity and access management, cybersecurity operations, vulnerability management, cybersecurity awareness, training, and testing, vendor risk management, and proactive services. It dives deep into managing Operational Technology (OT) & the Internet of Things (IoT), equipping readers with the knowledge and strategies to secure these critical areas. You will also explore the critical components of governance, risk, and compliance (GRC) within cybersecurity, focusing on the oversight and management of these functions. This book provides practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape.What you will learnBuild and define a cybersecurity program foundationDiscover the importance of why an architecture program is needed within cybersecurityLearn the importance of Zero Trust ArchitectureLearn what modern identity is and how to achieve itReview of the importance of why a Governance program is neededBuild a comprehensive user awareness, training, and testing program for your usersReview the importance of why a GRC program is needed Gain a thorough understanding of everything involved with regulatory and complianceWho this book is forThis book is geared towards the top leaders within an organization, C-level, CISO/CSO, directors, and program managers who build the strategy and execute the program. Cybersecurity managers, architects, engineers, administrators, analysts, and project managers who work in Cybersecurity would also benefit from this book. In addition, those who are still determining what they would like to do within cybersecurity can also benefit from this book by gaining an understanding of everything involved within a cybersecurity program. Basic knowledge of cybersecurity and its concepts will be helpful.

Resilient Fusion Navigation Techniques: Collaboration in Swarm (Unmanned System Technologies)

by Rong Wang Zhi Xiong Jianye Liu

This book describes the resilient navigation techniques under the background of collaboration in swarm. The significance of this work is that it focuses on the navigation enhancement by collaboration in swarm rather than ground infrastructure, which exploit potentialities of swarm in GNSS restricted environment. Although unmanned swarm is receiving greater attention, both through theoretical research and through increasing mention in the industrial developments, the navigation promotion by effective and efficient collaboration remains largely unexplored. While my scholarly work has explored some of the modeling, error characteristic, fusion algorithm, fault detection, and isolation aspects of the “adaptive navigation system” (such as the navigation system of robots and ground vehicles, aircrafts, aerospace vehicles, and unmanned aerial vehicles), the present book proposes the specialized investigation on the navigation with the resilient character, which could maintain the performance by essential collaboration with members in swarm in GNSS degradation environment. This book focused on the resilient navigation techniques under the background of collaboration in swarm. The key techniques of collaborative resilient navigation are proposed, including the collaboration framework, collaborative observation modeling, geometry optimization, integrity augmentation, and fault detection. The experiments are also carried out to validate the effectiveness of the corresponding techniques.

Resilient Oracle PL/SQL: Building Resilient Database Solutions for Continuous Operation

by Stephen B. Morris

As legacy and other critical systems continue to migrate online, the need for continuous operation is imperative. Code has to handle data issues as well as hard external problems today, including outages of networks, storage systems, power, and ancillary systems. This practical guide provides system administrators, DevSecOps engineers, and cloud architects with a concise yet comprehensive overview on how to use PL/SQL to develop resilient database solutions.Integration specialist Stephen B Morris helps you understand the language, build a PL/SQL toolkit, and collect a suite of reusable components and patterns. You'll dive into the benefits of synthesizing the toolkit with a requirements-driven, feature-oriented approach and learn how to produce resilient solutions by synthesizing the PL/SQL toolkit in conjunction with a scale of resilience.Build solid PL/SQL solutions while avoiding common PL/SQL antipatternsLearn why embedding complex business logic in SQL is often a brittle propositionLearn how to recognize and improve weak PL/SQL codeVerify PL/SQL code by running data-driven, in-database testsUnderstand the safe operation, maintenance, and modification of complex PL/SQL systemsLearn the benefits of thinking about features rather than just use casesDefine good requirements for PL/SQL and hybrid solutions involving PL/SQL and high level languages

Resilient Routing in Communication Networks

by Jacek Rak

This important text addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). Features: discusses FI architecture for network virtualization; introduces proposals for dedicated and shared protection in random failure scenarios and against malicious activities; describes measures for WMN survivability that allow for evaluation of performance under multiple failures; proposes a new scheme to enable proactive updates of WMN antenna alignment; includes a detailed analysis of the differentiated reliability requirements for VANET applications, with a focus on issues of multihop data delivery; reviews techniques for improving the stability of end-to-end VANET communication paths based on multipath routing and anycast forwarding.

Resilient Routing in Communication Networks: A Systems Perspective (Computer Communications and Networks)

by Jacek Rak

This practically focused monograph addresses the latest issues of resilient routing in networked systems. It consists of three parts and offers an in-depth introduction to the resilience of networked systems (Part I), a detailed description of schemes of resilient routing (Part II), and examples of the application of resilience mechanisms in selected communication scenarios (Part III). Topics and features: presents the essentials of network resilience; highlights the main causes of network node and link failures; elaborates on the costs and benefits of investing in resilience; discusses the taxonomy of challenges, faults, attributes, and disciplines of resilience; overviews the major metrics useful in evaluating resilience; provides a detailed classification of resilient routing schemes; analyzes the features of optimization models for selected problems of resilient routing; illustrates the properties of computationally efficient methods for determining the shortest sets of disjoint communication paths; shows the practical use of resilient routing mechanisms in selected communication scenarios with a particular focus on up-to-date concepts such as network virtualization or content-centric networking.

Resilient Wireless Sensor Networks

by Osameh M. Al-Kofahi Ahmed E. Kamal

This Springer Brief introduces wireless sensor networks (WSNs) and the need for resilient WSN operations in application domains. It presents traditional approaches of providing resilient operation of WSNs to ensure continuity of data delivery even when some network sensors fail. The pros and cons of each these approaches are discussed. Also included is an overview of network coding basics, and motivate the use of network coding-based protection in order to combine the advantages, but avoid the disadvantages of the traditional approaches. The authors cover the design and analysis of a centralized approach to network coding-based protection of WSNs. The coverage also includes practical and realistic network situations, and the coding strategies employed. Next discussed is how to recover from data losses using a distributed approach, which is more practical for large scale WSNs. Algorithms for scheduling of transmissions while implementing network coding-based in the two cases of using digital network coding, and analog network coding are covered. Resilient Wireless Sensor Networks includes a concise, but an in-depth coverage of the use of network coding to implement agile and resource efficient protection in WSNs. It will be of interest to professionals and researchers working in the areas of fault tolerance, network coding, and deployment of WSNs in harsh environment. Advanced-level students in electrical engineering and computer science will also find this research valuable as a reference.

Resilient computer system design

by Igor Schagaev Victor Castano

This book presents a paradigm for designing new generation resilient and evolving computer systems, including their key concepts, elements of supportive theory, methods of analysis and synthesis of ICT with new properties of evolving functioning, as well as implementation schemes and their prototyping. The book explains why new ICT applications require a complete redesign of computer systems to address challenges of extreme reliability, high performance, and power efficiency. The authors present a comprehensive treatment for designing the next generation of computers, especially addressing safety critical, autonomous, real time, military, banking, and wearable health care systems.

Resistance to the Current: The Dialectics of Hacking (Information Policy)

by Johan Soderberg Maxigas

How hacking cultures drive contemporary capitalism and the future of innovation.In Resistance to the Current, Johan Söderberg and Maxigas examine four historical case studies of hacker movements and their roles in shaping the twenty-first-century&’s network society. Based on decades of field work and analysis, this intervention into current debates situates an exploding variety of hacking practices within the contradictions of capitalism. Depoliticized accounts of computing cultures and collaborative production miss their core driver, write Söderberg and Maxigas: the articulation of critique and its recuperation into innovations.Drawing on accounts of building, developing, and running community wireless networks, 3D printers, hackerspaces, and chat protocols, the authors develop a theoretical framework of critique and recuperation to examine how hackers—who have long held a reputation for being underground rebels—transform their outputs from communal, underground experiments to commercial products that benefit the state and capital. This framework allows a dialectical understanding of contemporary social conflicts around technology and innovation. Hackers&’ critiques of contemporary norms spur innovation, while recuperation turns these innovations into commodified products and services. Recuperation threatens the autonomy of hacker collectives, harnessing their outputs for the benefit of a capitalist system.With significant practical implications, this sophisticated multidisciplinary account of technology-oriented movements that seek to challenge capitalism will appeal to science and technology readers interested in innovation studies, user studies, cultural studies, and media and communications.

Resistance, Liberation Technology and Human Rights in the Digital Age

by Giovanni Ziccardi

This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference between hacking and computer crimes, the book explains concepts of hacktivism, the information war between states, a new form of politics (such as open data movements, radical transparency, crowd sourcing and "Twitter Revolutions"), and the hacking of political systems and of state technologies. The book focuses on the protection of human rights in countries with oppressive regimes.

Resonant Games: Design Principles for Learning Games that Connect Hearts, Minds, and the Everyday (Digital Media and Learning)

by Eric Klopfer Jason Haas Scot Osterweil Louisa Rosenheck

Principles for designing educational games that integrate content and play and create learning experiences connecting to many areas of learners' lives. Too often educational videogames are narrowly focused on specific learning outcomes dictated by school curricula and fail to engage young learners. This book suggests another approach, offering a guide to designing games that integrates content and play and creates learning experiences that connect to many areas of learners' lives. These games are not gamified workbooks but are embedded in a long-form experience of exploration, discovery, and collaboration that takes into consideration the learning environment. Resonant Games describes twenty essential principles for designing games that offer this kind of deeper learning experience, presenting them in connection with five games or collections of games developed at MIT's educational game research lab, the Education Arcade.Each of the games—which range from Vanished, an alternate reality game for middle schoolers promoting STEM careers, to Ubiquitous Bio, a series of casual mobile games for high school biology students—has a different story, but all spring from these fundamental assumptions: honor the whole learner, as a full human being, not an empty vessel awaiting a fill-up; honor the sociality of learning and play; honor a deep connection between the content and the game; and honor the learning context—most often the public school classroom, but also beyond the classroom.

Resonant Scattering and Generation of Waves: Cubically Polarizable Layers (Mathematical Engineering Ser.)

by Lutz Angermann Vasyl V. Yatsyk

This monograph deals with theoretical aspects and numerical simulations of the interaction of electromagnetic fields with nonlinear materials. It focuses in particular on media with nonlinear polarization properties. It addresses the direct problem of nonlinear Electrodynamics, that is to understand the nonlinear behavior in the induced polarization and to analyze or even to control its impact on the propagation of electromagnetic fields in the matter. The book gives a comprehensive presentation of the results obtained by the authors during the last decade and put those findings in a broader, unified context and extends them in several directions.It is divided into eight chapters and three appendices. Chapter 1 starts from the Maxwell’s equations and develops a wave propagation theory in plate-like media with nonlinear polarizability. In chapter 2 a theoretical framework in terms of weak solutions is given in order to prove the existence and uniqueness of a solution of the semilinear boundary-value problem derived in the first chapter. Chapter 3 presents a different approach to the solvability theory of the reduced frequency-domain model. Here the boundary-value problem is reduced to finding solutions of a system of one-dimensional nonlinear Hammerstein integral equations. Chapter 4 describes an approach to the spectral analysis of the linearized system of integral equations. Chapters 5 and 6 are devoted to the numerical approximation of the solutions of the corresponding mathematical models. Chapter 7 contains detailed descriptions, discussions and evaluations of the numerical experiments. Finally, chapter 8 gives a summary of the results and an outlook for future work.

Resonant Tunneling: Quantum Waveguides of Variable Cross-Section, Asymptotics, Numerics, and Applications (Lecture Notes on Numerical Methods in Engineering and Sciences)

by Pekka Neittaanmäki Lev Baskin Boris Plamenevskii Oleg Sarafanov

This book studies electron resonant tunneling in two- and three-dimensional quantum waveguides of variable cross-sections in the time-independent approach. Mathematical models are suggested for the resonant tunneling and develop asymptotic and numerical approaches for investigating the models. Also, schemes are presented for several electronics devices based on the phenomenon of resonant tunneling. Compared to its first edition, this book includes four new chapters, redistributes the content between chapters and modifies the estimates of the remainders in the asymptotics of resonant tunneling characteristics. The book is addressed to mathematicians, physicists, and engineers interested in waveguide theory and its applications in electronics.

Resource Allocation for Software Defined Networks (SpringerBriefs in Computer Science)

by Dariusz Gasior

The book is devoted to the selected resource allocation problems in Software- Defined Networks. Moreover, it covers results concerning Software Defined Wide Area Networks (SD-WANs) which is one of the current networking hot topics. The variety of different cases is considered including virtualization and information-centric paradigm. For each case, the mathematical model together with the problem formulation is given and some solution algorithms are proposed. The algorithms are discussed and evaluated, mostly with simulations.

Resource Allocation in Decentralized Systems with Strategic Agents

by Ali Kakhbod

This thesis presents a significant contribution to decentralized resource allocation problems with strategic agents. The study focused on three classes of problems arising in communication networks. (C1). Unicast service provisioning in wired networks. (C2). Multi-rate multicast service provisioning in wired networks. (C3). Power allocation and spectrum sharing in multi-user multi-channel wireless communication systems. Problems in (C1) are market problems; problems in (C2) are a combination of markets and public goods; problems in (C3) are public goods. Dr. Kakhbod developed game forms/mechanisms for unicast and multi-rate multicast service provisioning that possess specific properties. First, the allocations corresponding to all Nash equilibria (NE) of the games induced by the mechanisms are optimal solutions of the corresponding centralized allocation problems, where the objective is the maximization of the sum of the agents' utilities. Second, the strategic agents voluntarily participate in the allocation process. Third, the budget is balanced at the allocations corresponding to all NE of the game induced by the mechanism as well as at all other feasible allocations. For the power allocation and spectrum sharing problem, he developed a game form that possesses the second and third properties as detailed above along with a fourth property: the allocations corresponding to all NE of the game induced by the mechanism are Pareto optimal. The thesis contributes to the state of the art of mechanism design theory. In particular, designing efficient mechanisms for the class of problems that are a combination of markets and public goods, for the first time, have been addressed in this thesis. The exposition, although highly rigorous and technical, is elegant and insightful which makes this thesis work easily accessible to those just entering this field and will also be much appreciated by experts in the field.

Resource Allocation in Network Function Virtualization: Problems, Models and Algorithms

by Song Yang Fan Li Xiaoming Fu Nan He

Network Function Virtualization (NFV) has recently attracted considerable attention from both research and industrial communities. Numerous papers have been published regarding solving the resource- allocation problems in NFV, from various perspectives, considering different constraints, and adopting a range of techniques. However, it is difficult to get a clear impression of how to understand and classify different kinds of resource allocation problems in NFV and how to design solutions to solve these problems efficiently.This book addresses these concerns by offering a comprehensive overview and explanation of different resource allocation problems in NFV and presenting efficient solutions to solve them. It covers resource allocation problems in NFV, including an introduction to NFV and QoS parameters modelling as well as related problem definition, formulation and the respective state-of-the-art algorithms.This book allows readers to gain a comprehensive understanding of and deep insights into the resource allocation problems in NFV. It does so by exploring (1) the working principle and architecture of NFV, (2) how to model the Quality of Service (QoS) parameters in NFV services, (3) definition, formulation and analysis of different kinds of resource allocation problems in various NFV scenarios, (4) solutions for solving the resource allocation problem in NFV, and (5) possible future work in the respective area.

Resource Discovery, Navigability and Trust Management Techniques for IoT and SIoT

by Venugopal K R Roopa M S Santosh Pattar

A ready reference for the next-generation discovery techniques, this book presents advanced research findings on resource discovery, network navigability, and trust management on the Internet of Things (IoT) and Social Internet of Things (SIoT) ecosystems. It discusses the benefits of integrating social networking concepts into the Internet of Things to find the preferable, reliable, scalable, and near-optimal detection of things or services. It explores the concepts of the Social Internet of Things in different domains of IoT, such as the Internet of Vehicles and the Industrial Internet of Things. This book works to recognize and respond to user queries and improve service provisioning, find the optimal solution for the link selection in the SIoT structure, develop large-scale platforms, and provide a smart mechanism for trust evaluation.· Covers the rapid advancements in low-cost sensor manufacturing, communication protocols, embedded systems, actuators, and hardware miniaturization that have contributed to the exponential growth of the IoT· Presents the fundamentals of a search system for sensor search and resource discovery in an IoT ecosystem· Includes the applicability of different search techniques across several application domains of the IoT under various use case scenarios· Discusses the thrust areas in SIoT (service discovery and composition, network navigability, relationship management, and trustworthiness management) and presents several prerequisites, challenges, and use case scenarios· Provides insights into current challenges in the domains of Internet of Things and Social Internet of ThingsThis book will be helpful to researchers, scholars, and postgraduate students in Computer Science and Information Technology departments.

Resource Management and Performance Analysis of Wireless Communication Networks

by Wuyi Yue Shunfu Jin

With the diversification of Internet services and the increase in mobile users, efficient management of network resources has become an extremely important issue in the field of wireless communication networks (WCNs). Adaptive resource management is an effective tool for improving the economic efficiency of WCN systems as well as network design and construction, especially in view of the surge in mobile device demands.This book presents modelling methods based on queueing theory and Markov processes for a wide variety of WCN systems, as well as precise and approximate analytical solution methods for the numerical evaluation of the system performance.This is the first book to provide an overview of the numerical analyses that can be gleaned by applying queueing theory, traffic theory and other analytical methods to various WCN systems. It also discusses the recent advances in the resource management of WCNs, such as broadband wireless access networks, cognitive radio networks, and green cloud computing. It assumes a basic understanding of computer networks and queueing theory, and familiarity with stochastic processes is also recommended.The analysis methods presented in this book are useful for first-year-graduate or senior computer science and communication engineering students. Providing information on network design and management, performance evaluation, queueing theory, game theory, intelligent optimization, and operations research for researchers and engineers, the book is also a valuable reference resource for students, analysts, managers and anyone in the industry interested in WCN system modelling, performance analysis and numerical evaluation.

Resource Management for Big Data Platforms

by Joanna Kołodziej Beniamino Di Martino Florin Pop

Serving as a flagship driver towards advance research in the area of Big Data platforms and applications, this book provides a platform for the dissemination of advanced topics of theory, research efforts and analysis, and implementation oriented on methods, techniques and performance evaluation. In 23 chapters, several important formulations of the architecture design, optimization techniques, advanced analytics methods, biological, medical and social media applications are presented. These chapters discuss the research of members from the ICT COST Action IC1406 High-Performance Modelling and Simulation for Big Data Applications (cHiPSet). This volume is ideal as a reference for students, researchers and industry practitioners working in or interested in joining interdisciplinary works in the areas of intelligent decision systems using emergent distributed computing paradigms. It will also allow newcomers to grasp the key concerns and their potential solutions.

Refine Search

Showing 48,951 through 48,975 of 62,782 results