This brief presents the challenges and solutions for VANETs’ security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network M
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to applicati
Commanding and controlling organizations in extreme situations is a challenging task in military, intelligence, and disaster management. Such command and control must be quick, effective, and consider
This work focuses on central catadioptric systems, from the early step of calibration to high-level tasks such as 3D information retrieval. The book opens with a thorough introduction to the sphere ca
Social media has drastically improved the way we can reach target audiences and serve our customers. Like its financial counterpart, the social media audit (SMA) can be described as a formalized revie
This text provides a survey of the latest research into the Hough transform for line detection and its contemporary developments. Written with students in mind, this work can serve as a condensed text
In this work, the unique power measurement capabilities of the Cray XT architecture were exploited to gain an understanding of power and energy use, and the effects of tuning both CPU and network band
Since the advent of the Semantic Web, interest in the dynamics of ontologies (ontology evolution) has grown significantly. Belief revision presents a good theoretical framework for dealing with this p
"ITILR 2011 At a Glance" is an important update to the internationally-recognized ITILR best practices for IT Service Management. "ITILR 2011 At a Glance" provides graphical and textual memory joggers
This work proposes a complete sensor-independent visual system that provides robust target motion detection. First, the way sensors obtain images, in terms of resolution distribution and pixel neighbo
The network management community has been pushed towards the design of alternative management approaches able to support heterogeneity, scalability, reliability, and minor human intervention. The empl
This book provides an analysis of transmission power and network performance in different wireless communication networks. It presents the latest research and techniques for power and interference con
The Web has become a rich source of personal information in the last few years. People twitter, blog, and chat online. Current feelings, experiences or latest news are posted. For instance, first hint
Whereas unicast routing determines a path from one source node to one destination node, multicast routing determines a path from one source to many destinations, or from many sources to many destinati
Research has deeply investigated several issues related to the use of integrity constraints on relational databases. In particular, a great deal of attention has been devoted to the problem of extract
Turn to Hands-On Science--20 Themes for 20 highly motivating, classroom-tested science units that help students learn by doing. Students practice the scientific inquiry skills outlined in the National
How to Do Science Experiments with Children is a reliable 200+ page resource for teaching science concepts to young children in a fun, hands-on way. This book contains 70 stress-free experiments that
Each of the 122 experiments in Science Experiments for Young Learners is presented in a 2-page lesson format. 1. The teacher resource page with: materials list step-by-step easy-to-follo
From animal habitats to the human body, matter to machines, rainforests to recycling, it's all here in one easy-to-use volume! Includes 296 reproducible picture cards, diagrams, graphic organizers and