Although recent global disasters have clearly demonstrated the power of social media to communicate critical information in real-time, its true potential has yet to be unleashed.
Although the precepts of software engineering have been around for decades, the field has failed to keep pace with rapid advancements in computer hardware and software.
Establishing adaptive control as an alternative framework to design and analyze Internet congestion controllers, End-to-End Adaptive Congestion Control in TCP/IP Networks employs a rigorously mathematical approach coupled with a lucid writing style to provide extensive background and introductory material on dynamic systems stability and neural network approximation; alongside future internet requests for congestion control architectures.
Following in the tradition of its popular predecessor, A Practical Guide to Content Delivery Networks, Second Edition offers an accessible and organized approach to implementing networks capable of handling the increasing data requirements of today'salways on mobile society.
As multimedia applications have become part of contemporary daily life, numerous paradigm-shifting technologies in multimedia processing have emerged over the last decade.
From small start-ups to major corporations, companies of all sizes have embraced cloud computing for the scalability, reliability, and cost benefits it can provide.
The Handbook of Human Factors in Web Design covers basic human factors issues relating to screen design, input devices, and information organization and processing, as well as addresses newer features which will become prominent in the next generation of Web technologies.
In today's increasingly competitive business environment, organizations must be able to adapt to the ever-changing business landscape where traditional business concepts no longer ensure success.
With recent advances in radio-frequency identification (RFID) technology, sensor networks, and enhanced Web services, the original World Wide Web is continuing its evolution into what is being called the Web of Things and Services.
While there are sporadic journal articles on socio-technical networks, there's long been a need for an integrated resource that addresses concrete socio-technical network (STN) design issues from algorithmic and engineering perspectives.
Peer-to-peer systems are evolving with new information-system architectures, leading to the idea that the principles of decentralization and self-organization will offer new approaches in informatics, especially for systems that scale with the number of users or for which central authorities do not prevail.
The challenges in implementing intelligent and autonomous software systems remain the development of self-adapting systems, self-healing applications, corporate global creation, and collaborated robotic teams.
Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace.
Whether you're already in the cloud, or determining whether or not it makes sense for your organization, Cloud Computing and Software Services: Theory and Techniques provides the technical understanding needed to develop and maintain state-of-the-art cloud computing and software services.
The rapid advancement of semantic web technologies, along with the fact that they are at various levels of maturity, has left many practitioners confused about the current state of these technologies.
Bring the customers you need to your business by expanding your reach to the right people and market using targeted tools and messages to increase business using this essential guide.
Knowing how to use Facebook to network and market yourself or your business gives a single person unlimited potential for reaching over 1 billion users in 60 countries.
Maximize one of the world's most powerful and popular forms of free communication for personal use, networking, public relations, research and marketing.
Whether you are a beginner or experienced user, learn about new features in this version or discover and use some of Outlook s functions for the first time.
You ve just purchased a TI-83 Plus calculator to assist in performing different types of mathematical equations now, how can you get the most out of it?
Analyze Key Security Mechanisms and Approaches with this practical primer, the first book on the market to cover critical IPv6 security considerations.
Thoroughly covering basic introductions and intuitions, technical details, and formal foundations, this text focuses on the established foundations in this area that have become relatively stable over time.
Maintaining compatibility among all affected network and application interfaces of modern enterprise systems can quickly become costly and overwhelming.
The emergence of content- and context-aware search engines, which not only personalize searching and delivery but also the content, has caused the emergence of new infrastructures capable of end-to-end ubiquitous transmission of personalized multimedia content to any device on any network at any time.
Grid technology offers the potential for providing secure access to remote services, thereby promoting scientific collaborations in an unprecedented scale.
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems.
Initiatives, such as INSPIRE and the US DHS Geospatial Data Model, are working to develop a rich set of standards that will create harmonized models and themes for the spatial information infrastructure.
Professionals in the video and multimedia industries need a book that explains industry standards for video coding and how to convert the compressed information between standards.
Aggressively being adopted by organizations in all markets, service-oriented architecture (SOA) is a framework enabling business process improvement for gaining competitive advantage.
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy.