Global E-government Readiness Report 2005: From E-government to E-inclusion In reaffirming the vision of a peaceful, prosperous and just world, leaders at the United Nations World Summit in 2005 outlined a vision of ‘…building a people-centred and inclusive information society, putting the potential of information and communication technologies at the service of development and addressing new challenges of the...
UMTS Network Planning, Optimization, and Inter-Operation with GSM
The continuing explosive growth in mobile communication is demanding more spectrally
efficient radio access technologies than the prevalent second generation (2G) systems such as
GSM to handle just the voice traffic. We are already witnessing high levels of mobile
penetration exceeding 70% in some countries. It is anticipated that by...
Linux Network Architecture
This book deals with the architecture of the network subsystem in the Linux kernel. The idea for this book was born at the Institute of Telematics at the University of Karlsruhe, Germany, where the Linux kernel has been used in many research projects and its network functionality is modified or enhanced, respectively, in a...
Design and Performance of 3G Wireless Networks and Wireless LANs Cellular phones, especially those enabled by second-generation
telecommunication systems, have had tremendous impacts on our daily lives.
In some countries such as India, the number of cellular phone subscribers
has far exceeded the number of wired phone subscribers. Meanwhile, the
Internet has also significantly changed our...
Algorithm Design for Networked Information Technology Systems
Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation...
Programming Many-Core Chips
Parallel computing has been confined, for much of its over 40 year history, to highly
specialized, technology-wise advanced domains such as scientific computing or
telecommunications. There were only a few experts who had the background and
experience to write efficient, robust and scalable programs for these parallel machines.
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...
Stochastic Modeling and Analysis of Telecoms Networks
This book addresses the stochastic modeling of telecommunication networks, introducing the main mathematical tools for that purpose, such as Markov processes, real and spatial point processes and stochastic recursions, and presenting a wide list of results on stability, performances and comparison of systems.
The authors propose a...
Newnes Engineering Science Pocket Book, Third Edition (Newnes Pocket Books) Newnes Engineering Science Pocket Book is a uniquely versatile and practical tool for a wide range of engineers and students. All the fundamentals of electrical and mechanical engineering science and physics are covered, with an emphasis on concise descriptions, key methods, clear diagrams, formulae and how to use them. John Bird's presentations...
|Result Page: 16 15 14 13 12 11 10 9 8 7 6 |