IS-IS, the Intermediate System to Intermediate System protocol, has been used effectively as a routing protocol for many large-scale networks, including service provider backbone, telephone system management, and power equipment networks. Used in conjunction with the Border Gateway Protocol...
Exhaustion of address space and global routing table growth necessitate important revisions to the current version of the Internet Protocol, IPv4. IP version 6 offers greater address space and additional features to support the evolving requirements of Internet applications. Deployed alongside current IPv4 networks, IPv6 will restore the...
Research in multi-agent systems offers a promising technology for problems with networks, online trading and negotiations but also social structures and communication. This is a book on agent and multi-agent technology for internet and enterprise systems. The book is a pioneer in the combination of the fields and is based on the concept of...
This research monograph presents basic foundational aspects for a theory of statistics with fuzzy data, together with a set of practical applications. Fuzzy data are modeled as observations from random fuzzy sets. Theories of fuzzy logic and of random closed sets are used as basic ingredients in building statistical concepts and procedures in the...
The complete updated edition of this best-selling reference provides an unsurpassed account of process control--from the very basics of theory to advanced control applications. This edition of this guide fully explains control technology principles applied to industrial fluid processes, including time-domain and relative-gain analysis. Control...
Feedback Amplifiers: Theory and Design deals with feedback and feedback amplifiers. Although this topic has been extensively investigated over the years, theoretically exact and at the same time sufficiently simple and well organized material is not, to the authors' judgement, present today in literature. After describing the fundamental...
I was recently invited to participate in a cyber security dinner discussion by a few
members of a well-known Washington, DC, think tank. The idea was that we could
enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about
this “cyber warfare stuff.” It seems that the new...
Ambient Intelligence (AmI) is a recent paradigm emerging from Artificial Intelligence (AI), where computers are used as proactive tools assisting people with their day-to-day activities, making everyone’s life more comfortable.
Another main concern of AmI originates from the human computer interaction domain and focuses on...
The UML community has begun to define a series of 'profiles' which better suit the needs of UML-users within specific domains, settings or technologies.
The UML Profile for Framework Architectures provides a UML profile for object and component frameworks. It shows how to describe framework architectures and to support...
Reverse engineering is the process of discovering the technological principles of an object or component through analysis of its structure and function. Such analysis can then be used to redesign the object very quickly using computer-aided design in concert with rapid-manufacturing processes to produce small numbers of components adapted to the...
The Windows 7, Enterprise Desktop Support Technician title of the Microsoft Official
Academic Course (MOAC) series includes two books: a textbook and a lab manual. The
exercises in the lab manual are designed either for a virtual machine environment or for
classroom use under the supervision of an instructor or lab aide. In an...