Sensor networks have many interesting applications with great utility; however, their actually deployment and realization rely on continuous innovations and solutions to many challenging problems. Thus, sensor networks have recently attracted the attention of many researchers and practitioners. The compilation of the Handbook on Sensor Networks will meet the demand of the sensor network community for a comprehensive reference and summary of the current state of the area.The Handbook on Sensor Networks is a collection of approximately 40 chapters on sensor network theory and applications. The book spans a wide spectrum and includes topics in medium access control, routing, security and privacy, coverage and connectivity, modeling and simulations, multimedia, energy efficiency, localization and tracking, design and implementation, as well as sensor network applications.
This volume contains 69 papers presented at ICICT 2015: International Congress on Information and Communication Technology. The conference was held during 9th and 10th October, 2015, Udaipur, India and organized by CSI Udaipur Chapter, Division IV, SIG-WNS, SIG-e-Agriculture in association with ACM Udaipur Professional Chapter, The Institution of Engineers (India), Udaipur Local Centre and Mining Engineers Association of India, Rajasthan Udaipur Chapter. This volume contains papers mainly focused on ICT for Managerial Applications, E-governance, IOT and E-Mining.
A relative newcomer to the field of wireless communications, ad hoc networking is growing quickly, both in its importance and its applications. With rapid advances in hardware, software, and protocols, ad hoc networks are now coming of age, and the time has come to bring together into one reference their principles, technologies, and techniques. The Handbook of Ad Hoc Wireless Networks does exactly that. Experts from around the world have joined forces to create the definitive reference for the field. From the basic concepts, techniques, systems, and protocols of wireless communication to the particulars of ad hoc network routing methods, power, connections, traffic management, and security, this handbook covers virtually every aspect of ad hoc wireless networking. It includes a section that explores several routing methods and protocols directly related to implementing ad hoc networks in a variety of applications. The benefits of ad hoc wireless networks are many, but several challenges remain. Organized for easy reference, The Handbook of Ad Hoc Wireless Networks is your opportunity to gain quick familiarity with the state of the art, have at your disposal the only complete reference on the subject available, and prepare to meet the technological and implementation challenges you'll encounter in practice.
This monograph presents the outcome of a GI-Dagstuhl Seminar held in Dagstuhl Castle in November 2005. It gives a first overview of algorithmic results on wireless ad hoc and sensor networks. Many chapters deal with distributed algorithms. Importance is attached to topics that combine both interesting aspects of wireless networks and attractive algorithmic methods. Each chapter provides a survey of some part of the field, while selected results are described in more detail.
During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry. A large number of researchers, including computer scientists and engineers, have been interested in solving challenging problems that span all the layers of the protocol stack of sensor networking systems. Several venues, such as journals, conferences, and workshops, have been launched to cover innovative research and practice in this promising and rapidly advancing field. Because of these trends, I thought it would be beneficial to provide our sensor networks community with a comprehensive reference on as much of the findings as possible on a variety of topics in wireless sensor networks. As this area of research is in continuous progress, it does not seem to be a reasonable solution to keep delaying the publication of such reference any more. This book relates to the second volume and focuses on the advanced topics and applications of wireless sensor networks. Our rationale is that the second volume has all application-specific and non-conventional sensor networks, emerging techniques and advanced topics that are not as matured as what is covered in the first volume. Thus, the second volume deals with three-dimensional, underground, underwater, body-mounted, and societal networks. Following Donald E. Knuth’s above-quoted elegant strategy to focus on several important fields (The Art of Computer Programming: Fundamental Algorithms, 1997), all the book chapters in this volume include up-to-date research work spanning various topics, such as stochastic modeling, barrier and spatiotemporal coverage, tracking, estimation, counting, coverage and localization in three-dimensional sensor networks, topology control and routing in three-dimensional sensor networks, underground and underwater sensor networks, multimedia and body sensor networks, and social sensing. Most of these major topics can be covered in an advanced course on wireless sensor networks. This book will be an excellent source of information for graduate students majoring in computer science, computer engineering, electrical engineering, or any related discipline. Furthermore, computer scientists, researchers, and practitioners in both academia and industry will find this book useful and interesting.
One of Springer’s renowned Major Reference Works, this awesome achievement provides a comprehensive set of solutions to important algorithmic problems for students and researchers interested in quickly locating useful information. This first edition of the reference focuses on high-impact solutions from the most recent decade, while later editions will widen the scope of the work. All entries have been written by experts, while links to Internet sites that outline their research work are provided. The entries have all been peer-reviewed. This defining reference is published both in print and on line.
In the computer science industry, high levels of performance remain the focal point in software engineering. This quest has made current systems exceedingly complex, as practitioners strive to discover novel approaches to increase the capabilities of modern computer structures. A prevalent area of research in recent years is scalable transaction processing and its usage in large databases and cloud computing. Despite its popularity, there remains a need for significant research in the understanding of scalability and its performance within distributed databases. Handling Priority Inversion in Time-Constrained Distributed Databases provides emerging research exploring the theoretical and practical aspects of database transaction processing frameworks and improving their performance using modern technologies and algorithms. Featuring coverage on a broad range of topics such as consistency mechanisms, real-time systems, and replica management, this book is ideally designed for IT professionals, computing specialists, developers, researchers, data engineers, executives, academics, and students seeking research on current trends and developments in distributed computing and databases.
The huge and growing demand for wireless communication systems has spurred a massive effort on the parts of the computer science and electrical engineering communities to formulate ever-more efficient protocols and algorithms. Written by a respected figure in the field, Handbook of Wireless Networks and Mobile Computing is the first book to cover the subject from a computer scientist's perspective. It provides detailed practical coverage of an array of key topics, including cellular networks, channel assignment, queuing, routing, power optimization, and much more.
IDT (Intelligent Decision Technologies) seeks an interchange of research on intelligent systems and intelligent technologies which enhance or improve decision making in industry, government and academia. The focus is interdisciplinary in nature, and includes research on all aspects of intelligent decision technologies, from fundamental development to the applied system. It constitutes a great honor and pleasure for us to publish the works and new research results of scholars from the First KES International Symposium on Intelligent Decision Technologies (KES IDT’09), hosted and organized by University of Hyogo in conjunction with KES International (Himeji, Japan, April, 2009). The symposium was concerned with theory, design, development, implementation, testing and evaluation of intelligent decision systems. Its topics included intelligent agents, fuzzy logic, multi-agent systems, artificial neural networks, genetic algorithms, expert systems, intelligent decision making support systems, information retrieval systems, geographic information systems, and knowledge management systems. These technologies have the potential to support decision making in many areas of management, international business, finance, accounting, marketing, healthcare, military applications, production, networks, traffic management, crisis response, and human interfaces.
On behalf of the NDT 2010 conference, the Program Committee and Charles University in Prague, Czech Republic, we welcome you to the proceedings of the Second International Conference on ‘Networked Digital Technologies’ (NDT 2010). The NDT 2010 conference explored new advances in digital and Web technology applications. It brought together researchers from various areas of computer and information sciences who addressed both theoretical and applied aspects of Web technology and Internet applications. We hope that the discussions and exchange of ideas that took place will contribute to advancements in the technology in the near future. The conference received 216 papers, out of which 85 were accepted, resulting in an acceptance rate of 39%. These accepted papers are authored by researchers from 34 countries covering many significant areas of Web applications. Each paper was evaluated by a minimum of two reviewers. Finally, we believe that the proceedings document the best research in the studied areas. We express our thanks to the Charles University in Prague, Springer, the authors and the organizers of the conference.