This book constitutes the refereed proceedings of the 15th International Conference on Information Security Practice and Experience, ISPEC 2019, held in Kuala Lumpur, Malaysia, in November 2019.
ISBN:
(数字)9783030343392
ISBN:
(纸本)9783030343385
This book constitutes the refereed proceedings of the 15th International Conference on Information Security Practice and Experience, ISPEC 2019, held in Kuala Lumpur, Malaysia, in November 2019.
This open access book, authored by a world-leading researcher in this field, describes fundamentals of dynamic spectrum management, provides a systematic overview on the enabling technologies covering cognitive radio,...
详细信息
ISBN:
(数字)9789811507762
ISBN:
(纸本)9789811507755;9789811507786
This open access book, authored by a world-leading researcher in this field, describes fundamentals of dynamic spectrum management, provides a systematic overview on the enabling technologies covering cognitive radio, blockchain, and artificial intelligence, and offers valuable guidance for designing advanced wireless communications systems. This book is intended for a broad range of readers, including students and professionals in this field, as well as radio spectrum policy makers.
The 2 volume-set of LNCS 12190 and 12191 constitutes the refereed proceedings of the 12th International Conference on Virtual, Augmented and Mixed Reality, VAMR 2020, which was due to be held in July 2020 as part of H...
详细信息
ISBN:
(数字)9783030496951
ISBN:
(纸本)9783030496944
The 2 volume-set of LNCS 12190 and 12191 constitutes the refereed proceedings of the 12th International Conference on Virtual, Augmented and Mixed Reality, VAMR 2020, which was due to be held in July 2020 as part of HCI International 2020 in Copenhagen, Denmark. The conference was held virtually due to the COVID-19 pandemic.;A total of 1439 papers and 238 posters have been accepted for publication in the HCII 2020 proceedings from a total of 6326 submissions.;The 71 papers included in these HCI 2020 proceedings were organized in topical sections as follows:;Part I: design and user experience in VAMR; gestures and haptic interaction in VAMR; cognitive, psychological and health aspects in VAMR; robots in VAMR.;Part II: VAMR for training, guidance and assistance in industry and business; learning, narrative, storytelling and cultural applications of VAMR; VAMR for health, well-being and medicine.
Thomas Pötsch investigates the channel properties of cellular networks and analyzes the effects that cause inefficient performance of legacy congestion control protocols, such as TCP and its variants, on cellular...
详细信息
ISBN:
(数字)9783658148157
ISBN:
(纸本)9783658148140
Thomas Pötsch investigates the channel properties of cellular networks and analyzes the effects that cause inefficient performance of legacy congestion control protocols, such as TCP and its variants, on cellular networks. Inspired by the findings, a novel delay-based congestion control protocol called Verus is proposed and evaluated across a variety of network scenarios. Furthermore, the author develops a stochastic two-dimensional discrete-time Markov modeling approach that dramatically simplifies the understanding of delay-based congestion control protocols.
Advances in the miniaturization of microelectromechanical systems have led to battery-powered sensor nodes that have sensing, communication and p- cessingcapabilities. Thesesensornodescanbenetworkedinanadhocmanner to ...
详细信息
ISBN:
(数字)9781846282133
ISBN:
(纸本)9781852339517;9781849969727
Advances in the miniaturization of microelectromechanical systems have led to battery-powered sensor nodes that have sensing, communication and p- cessingcapabilities. Thesesensornodescanbenetworkedinanadhocmanner to perform distributed sensing and information processing. Such ad hoc s- sor networks provide greater fault tolerance and sensing accuracy and are typically less expensive compared to the alternative of using only a few large isolated sensors. These networks can also be deployed in inhospitable terrains or in hostile environments to provide continuous monitoring and processing capabilities. A typical sensor networkapplication is inventorytracking in factorywa- houses. A single sensor node can be attached to each item in the warehouse. These sensor nodes can then be used for tracking the location of the items as they are moved within the warehouse. They can also provide information on the location of nearby items as well as the history of movement of various items. Once deployed, the sensor network needs very little human interv- tion and can function autonomously. Another typical application of sensor networks lies in military situations. Sensor nodes can be air-dropped behind enemy lines or in inhospitable terrain. These nodes can self-organize th- selves and provide unattended monitoring of the deployed area by gathering information about enemy defenses and equipment, movement of troops, and areas of troop concentration. They can then relay this information back to a friendly base station for further processing and decision making. Sensor nodes are typically characterizedby small form-factor,limited b- tery power, and a small amount of memory.
暂无评论