In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.
Addressing the demand for authoritative information on...
This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...
Examine the challenges of 4G in the light of impending and crucial future communication needs, and review the lessons learned from an implementation and system operation perspective with an eye towards the next generation – 5G. You'll investigate key changes and additions to 5G in terms of use cases. You'll also learn about the...
A practical and concise book that teaches XML from the ground up. This tutorial style presents various XML methodologies and techniques in an easy to understand way, building a basis for further exploration.
XML is essentially an enabling technology, dry and boring on its own. As a result, most books on the market are...
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...
Workflows are being rethought and remodelled across the architecture, engineering and construction (AEC) spectrum. The synthesis of building information modelling (BIM) platforms with digital simulation techniques and increasing access to data, charting building performance, is allowing architects to engage in the generation of new workflows...
Graph Theory, Combinatorics and Algorithms:Interdisciplinary Applications focuses on discrete mathematics and combinatorial algorithms interacting with real world problems in computer science, operations research, applied mathematics and engineering. The book contains eleven chapters written by...
Through the rapid development of proteomics methods and technologies, an enormous amount of data was created, leading to a wide-spread rethinking of strategy design and data interpretation. In Data Mining in Proteomics: From Standards to Applications, experts in the field present these new insights within the proteomics community, taking the...
This text is written for use in a second course in circuit analysis. The reader of this book should have the traditional undergraduate knowledge of an introductory circuit analysis material such as Circuit Analysis I with MATLAB® Applications by this author. Another prerequisite would be knowledge of differential equations, and in most...