This book constitutes the proceedings of the 9th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, ALGOSENSORS 2013, held in Sophia Ant
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in secu
This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy a
This book constitutes the proceedings of the Second International Conference on Citizen Sensor Networks, CitiSens 2013, held in Barcelona, Spain, in September 2013. The 8 papers presented in this volu
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11? based wireless networks, IP-based multimedia communications over w
This book constitutes the refereed proceedings of the First International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2005, held in Wuhan, China in December 2005. The volume also contains 12
This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless
This book constitutes the refereed proceedings of the Third IFIP TC 6 International Conference on Wireless Communications and Information Technology for Developing Countries, WCITD 2010 and the IFIP
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on Sensor Systems and Software, S-Cube 2013, held in Lucca, Italy, 2013. The 8 revise
This book describes a new design approach for energy-efficient, Domain-Specific Instruction set Processor (DSIP) architectures for the wireless baseband domain. The innovative techniques presented ena
MEMS-based Circuits and Systems for Wireless Communications provides comprehensive coverage of RF-MEMS technology from device to system level. This edited volume places emphasis on how system performa
Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first compre
The book reports on the latest theories on artificial neural networks, with a special emphasis on bio-neuroinformatics methods. It includes twenty-three papers selected from among the best contributio
Value- and risk-oriented management is a holistic method of managing businesses. In this book both actuarial methods and methods pertaining to classical internal control and classical risk management
This book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queuing theory and sim
The primary purpose of this book is to show that a multilayer neural network can be considered as a multistage system, and then that the learning of this class of neural networks can be treated as a s
This book is the third of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class
This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-clas
Flying insects are intelligent micromachines capable of exquisite maneuvers in unpredictable environments. Understanding these systems advances our knowledge of flight control, sensor suites, and unst
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in Sept
This book constitutes the post-proceedings of the 5th International ICST Conference on Mobile Networks and Management, MONAMI 2013, held in Cork, Ireland, in September 2013. The 18 revised full papers
This brief introduces the fundamental theory and development of managing radio resources using a water-filling algorithm that can optimize system performance in wireless communication. Geometric Water
Service science constitutes an interdisciplinary approach to systematic innovation in service systems, integrating managerial, social, legal and engineering aspects to address the theoretical and prac
This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Barcelona, Spain, in October 2013. The 14 revised full papers
This case study investigated the perceptions of the third year student teachers of the first year pre-service Mathematics programme at Seke Teachers' College in Zimbabwe. Student background characteri
The Ninety-Eighth Engineer (General Service) Regiment, African American, embarked for North Africa in February 1943 and landed at Algeria. The regiment became nomadic and split up its battalions and c
This book is about Future Information Technology, Application, and Service (FutureTech 2012 volume 2). The topics of FutureTech 2012 cover the current hot topics satisfying the world-wide ever-changin
James D. Bulloch's The Secret Service of the Confederate States in Europe is the personal account of Jefferson Davis's secret man in London. At the outbreak of the Civil War, the Confederacy tapped Bu
This brief examines resource allocation and interference management for 4G femtocells. It introduces 4G femtocells in the context of 4G mobile networks and discusses related technical challenges in re
This book covers the latest advances in the rapid growing field of inter-cooperative collective intelligence aiming the integration and cooperation of various computational resources, networks and int
This thesis presents a significant contribution to decentralized resource allocation problems with strategic agents. The study focused on three classes of problems arising in communication networks. (
Missiologists and mission-oriented folks have been invited to reflect on topics that touch on the transforming power of God's Spirit. This series of essays has been produced as one way of celebrating
Missiologists and mission-oriented folks have been invited to reflect on topics that touch on the transforming power of God's Spirit. This series of essays has been produced as one way of celebrating
The record of military service of Gerald Glyn Griffiths, who served with the Grenadier Guards from August 1, 1961, until July 31, 1970 (discharged on July 31, 1973; service number, 23862933; rank, lan
This book is proof that most people don't know how to act in public. If you have ever worked in the food service industry you will indentify with most or all of these stories . If you have not worked
This book is proof that most people don't know how to act in public. If you have ever worked in the food service industry you will indentify with most or all of these stories . If you have not worked
A leader may learn their best lessons by watching a sheepdog. Sheepdogs are bright, full of unbridled energy, and loyal. They are, above all, goal oriented and intensely focused on rounding up the she
This book will enable the production of reliable, accurate, reproducible (best possible care) results that satisfies the customer's requirements obtained from an accredited, process oriented, health a
This book will enable the production of reliable, accurate, reproducible (best possible care) results that satisfies the customer's requirements obtained from an accredited, process oriented, health a
Traffic Measurement on the Internet presents several novel online measurement methods that are compact and fast. Traffic measurement provides critical real-world data for service providers and network