Details

Pervasive Computing and Networking


Pervasive Computing and Networking


1. Aufl.

von: Mohammad S. Obaidat, Mieso Denko, Isaac Woungang

84,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 09.06.2011
ISBN/EAN: 9781119971429
Sprache: englisch
Anzahl Seiten: 344

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networks</b> <p>With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future, pervasive computing and networking research and applications are among the hot topics on the agenda of researchers working on the next generation of mobile communications and networks.</p> <p>This book provides a comprehensive guide to selected topics, both ongoing and emerging, in pervasive computing and networking. It contains contributions from high profile researchers and is edited by leading experts in this field. The main topics covered in the book include pervasive computing and systems, pervasive networking security, and pervasive networking and communication.</p> <p>Key Features:</p> <ul> <li>Discusses existing and emerging communications and computing models, design architectures, mobile and pervasive wireless applications, technology and research challenges in pervasive computing systems, networking and communications</li> <li>Provides detailed discussions of key research challenges and open research issues in the field of autonomic computing and networking</li> <li>Offers information on existing experimental studies including case studies, implementation test-beds in industry and academia</li> <li>Includes a set of PowerPoint slides for each chapter for instructors adopting it as a textbook</li> </ul> <p><i>Pervasive Computing and Networking</i> will be an ideal reference for practitioners and researchers working in the areas of communication networking and pervasive computing and networking. It also serves as an excellent textbook for graduate and senior undergraduate courses in computer science, computer engineering, electrical engineering, software engineering, and information engineering and science.</p>
<b>List of Contributors</b> <p><b>About the Editors</b></p> <p><b>PART ONE PERVASIVE COMPUTING AND SYSTEMS</b></p> <p><b>1 Introduction<br /> </b><i>Mohammad S. Obaidat and Isaac Woungang</i></p> <p>1.1 Pervasive Computing and Its Significance</p> <p>1.2 Research Trends in Pervasive Computing and Networking</p> <p>1.3 Scanning the Book</p> <p>1.4 Target Audience</p> <p>1.5 Supplementary Resources</p> <p>1.6 Acknowledgments</p> <p>References </p> <p><b>2 Tools and Techniques for Dynamic Reconfiguration and Interoperability of Pervasive Systems<br /> </b><i>Evens Jean, Sahra Sedigh, Ali R. Hurson, and Behrooz A. Shirazi</i></p> <p>2.1 Introduction.</p> <p>2.2 Mobile Agent Technology</p> <p>2.3 Sensor Networks</p> <p>2.4 Collaboration and Interoperability Among Sensor Networks</p> <p>2.5 Applications</p> <p>2.6 Conclusion</p> <p>References </p> <p><b>3 Models for Service and Resource Discovery in Pervasive Computing<br /> </b><i>Mehdi Khouja, Carlos Juiz, Ramon Puigjaner, and Farouk Kamoun</i></p> <p>3.1 Introduction</p> <p>3.2 Service Oriented Architecture</p> <p>3.3 Industry and Consortia Supported Models for Service Discovery</p> <p>3.4 Research Initiatives in Service Discovery for Pervasive Systems</p> <p>3.5 Conclusions</p> <p>References </p> <p> <b>4 Pervasive Learning Tools and Technologies<br /> </b><i>Neil Y. Yen, Qun Jin, Hiroaki Ogata, Timothy K. Shih, and Y. Yano</i></p> <p>4.1 Introduction</p> <p>4.2 Pervasive Learning: A Promising Innovative Paradigm</p> <p>4.3 Emerging Technologies and Systems for Pervasive Learning</p> <p>4.4 Integration of Real-World Practice and Experience with Pervasive Learning</p> <p>4.5 Nature of Pervasive Learning and Provision of Well-Being in Education</p> <p>4.6 Conclusion</p> <p>References </p> <p> <b>5 Service Management in Pervasive Computing Environments<br /> </b><i>Jiannong Cao, Joanna Siebert, and Vaskar Raychoudhury</i></p> <p>5.1 Introduction</p> <p>5.2 Service Management in Pervasive Computing Environments</p> <p>5.3 Techniques for Service Management in PvCE</p> <p>5.4 Service Composition</p> <p>5.5 Conclusions</p> <p>References </p> <p> <b>6 Wireless Sensor Cooperation for a Sustainable Quality of Information<br /> </b><i>Abdelmajid Khelil, Christian Reinl, Brahim Ayari, Faisal Karim Shaikh, Piotr Szczytowski, Azad Ali, and Neeraj Suri</i></p> <p>6.1 Introduction</p> <p>6.2 Sensing the Real World</p> <p>6.3 Inter-Sensor Cooperation</p> <p>6.4 Mobile Sensor Cooperation</p> <p>6.5 Cooperation Across Mobile Entities</p> <p>6.6 Inter-WSN Cooperation</p> <p>6.7 Conclusions and Future Research Directions</p> <p>References </p> <p> <b>7 An Opportunistic Pervasive Networking Paradigm: Multi-Hop Cognitive Radio Networks<br /> </b><i>Didem Gozupek and Fatih Alagoz</i></p> <p>7.1 Introduction</p> <p>7.2 Overview of Multi-Hop Cognitive Radio Networks MAC Layer</p> <p>7.3 Proposed Mac Layer Protocols</p> <p>7.4 Open Issues</p> <p>7.5 Conclusions</p> <p>References </p> <p> <b>8 Wearable Computing and Sensor Systems for Healthcare<br /> </b><i>Franca Delmastro and Marco Conti</i></p> <p>8.1 Introduction</p> <p>8.2 The Health Body Area Network</p> <p>8.3 Medical and Technological Requirements of Health Sensors</p> <p>8.4 Wearable Sensors for Vital Signals Monitoring</p> <p>8.5 Wearable Sensors for Activity Recognition</p> <p>8.6 Sensors and Signals for Emotion Recognition</p> <p>8.7 Intra-BAN Communications in Pervasive Healthcare Systems: Standards and Protocols</p> <p>8.8 Conclusions</p> <p>References </p> <p> <b>9 Standards and Implementation of Pervasive Computing Applications<br /> </b><i>Daniel Cascado, Jose Luis Sevillano, Luis Fernandez-Luque, Karl Johan Grøttum, L. Kristian Vognild, and T. M. Burkow</i></p> <p>9.1 Introduction</p> <p>9.2 Wireless Technologies and Standards</p> <p>9.3 Middleware</p> <p>9.4 Case Studies</p> <p>References </p> <p><b>PART TWO PERVASIVE NETWORKING SECURITY.</b></p> <p><b>10 Security and Privacy in Pervasive Networks<br /> </b><i>Tarik Guelzim and Mohammad S. Obaidat</i></p> <p>10.1 Introduction</p> <p>10.2 Security Classics</p> <p>10.3 Hardening Pervasive Networks</p> <p>10.4 Privacy in Pervasive Networks</p> <p>10.5 Conclusion</p> <p>References</p> <p><b>11 UnderstandingWormhole Attacks in Pervasive Networks<br /> </b><i>Isaac Woungang, Sanjay Kumar Dhurandher, and Abhishek Gupta</i></p> <p>11.1 Introduction</p> <p>11.2 A Wormhole Attack</p> <p>11.3 Severity of a Wormhole Attack</p> <p>11.4 Background</p> <p>11.5 Classification of Wormholes</p> <p>11.6 Wormhole Attack Modes</p> <p>11.7 Mitigating Wormhole Attacks</p> <p>11.8 Discussion of Some Mitigating Solutions to Avoid Wormhole Attacks</p> <p>11.9 Conclusion and Future Work</p> <p>References</p> <p><b>12 An Experimental Comparison of Collaborative Defense Strategies for Network Security<br /> </b><i>Hao Chen and Yu Chen</i></p> <p>12.1 Introduction</p> <p>12.2 Background</p> <p>12.3 Small-World Network Based Modeling Platform</p> <p>12.4 Internet Worm Attack and Defense</p> <p>12.5 Experiments and Performance Evaluation</p> <p>12.6 Conclusions</p> <p>References </p> <p><b>13 Smart Devices, Systems and Intelligent Environments<br /> </b><i>Joaquin Entrialgo and Mohammad S. Obaidat</i></p> <p>13.1 Introduction</p> <p>13.2 Smart Devices and Systems</p> <p>13.3 Intelligent Environments</p> <p>13.4 Trends</p> <p>13.5 Limitations and Challenges</p> <p>13.6 Applications and Case Studies</p> <p>13.7 Conclusion</p> <p>References </p> <p><b>PART THREE PERVASIVE NETWORKING AND COMMUNICATIONS.</b></p> <p><b>14 Autonomic and Pervasive Networking<br /> </b><i>Thabo K. R. Nkwe, Mieso K. Denko, and Jason B. Ernst</i></p> <p>14.1 Introduction</p> <p>14.2 Ubiquitous/Pervasive Networks</p> <p>14.3 Applying Autonomic Techniques to Ubiquitous/Pervasive Networks</p> <p>14.4 Self-* (star) In Autonomic and Pervasive Networks</p> <p>14.5 Autonomic and Pervasive Networking Challenges</p> <p>14.6 Conclusions and Future Directions</p> <p>References </p> <p><b>15 An Adaptive Architecture of Service Component for Pervasive Computing<br /> </b><i>Fei Li, Y. He, Athanasios V. Vasilakos, and Naixue Xiong</i></p> <p>15.1 Introduction</p> <p>15.2 Motivation</p> <p>15.3 An Overview of the Delaying Adaptation Tool</p> <p>15.4 Case Study</p> <p>15.5 Related Work</p> <p>15.6 Conclusions</p> <p>References </p> <p><b>16 On Probabilistic <i>k</i>-Coverage in Pervasive Wireless Sensor Networks<br /> </b><i>Habib M. Ammari</i></p> <p>16.1 Introduction</p> <p>16.2 The Coverage Problem</p> <p>16.3 Coverage Configuration Problem</p> <p>16.4 Stochastic <i>k</i>-Coverage Protocol</p> <p>16.5 Conclusion</p> <p>References </p> <p><b>17 On the Usage of Overlays to Provide QoS Over IEEE 802.11b/g/e Pervasive and Mobile Networks<br /> </b><i>Luca Caviglione, Franco Davoli, and Piergiulio Maryni</i></p> <p>17.1 Introduction</p> <p>17.2 A Glance at P2P Overlay Networks and QoS Mechanisms</p> <p>17.3 Design of Overlays to Support QoS</p> <p>17.4 Performance Evaluation</p> <p>17.5 Conclusions and Future Developments</p> <p>Appendic I. The Distributed Algortihm for Bandwidth Management</p> <p>References </p> <p><b>18 Performance Evaluation of Pervasive Networks Based on WiMAX Networks<br /> </b><i>Elmabruk Laias and Irfan Awan</i></p> <p>18.1 Introduction</p> <p>18.2 IEEE 802.16 Architecture and QoS Requirements</p> <p>18.3 Related Work</p> <p>18.4 Proposed QoS Framework</p> <p>18.5 Simulation Experiments and Numerical Results</p> <p>18.6 Summary</p> <p>References </p> <p><b>19 Implementation Frameworks for Mobile and Pervasive Networks<br /> </b><i>Bilhanan Silverajan and Jarmo Harju</i></p> <p>19.1 Introduction</p> <p>19.2 Correlating Design to Implementations</p> <p>19.3 Challenges for Implementation Frameworks</p> <p>19.4 State of the Art in Implementation Frameworks</p> <p>19.5 Current Frameworks Research for Network Protocols and Applications</p> <p>19.6 Evaluating Frameworks and Implementations</p> <p>19.7 Conclusion</p> <p>References</p> <p><b>Index</b></p>
<p><b>Professor Mohammad Obaidat, Monmouth University, USA</b><br />Mohammad Obaidat received his Ph.D. and M. S. degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. Dr. Obaidat is currently a full Professor of Computer Science at Monmouth University, NJ, USA. Among his previous positions are Chair of the Department of Computer Science and Director of the Graduate Program at Monmouth University and a faculty member at the City University of New York.</p> <p><b>Professor Mieso Denko, University of Guelph, Canada</b><br />Mieso Denko received his MSc form the University of Wales, UK, and his PhD from the University of Natal, South Africa, both in Computer Science. Since November 2002, Dr. Denko has been with the Department of Computing and Information Science, Guelph, Ontario, Canada, where he is now an Associate Professor.<br />Dr. Isaac Woungang, Ryerson University, Canada</p> <p><b>Isaac Woungang</b> received his M.Sc and Ph.D degrees all in Mathematics from Université de la Méditerranée-Aix Marseille II, Luminy, France, and Université du Sud, Toulon-Var, France, in 1990 and 1994 respectively. In 1999, he received an M.A.Sc from the INRS-Énergie, Matériaux et Télécommunications, University of Quebec, Montreal, Canada. From 1999 to 2002, he worked as a Software engineer at Nortel Networks. Since 2002, he has been with the Department of Computer Science at Ryerson University.</p>
<b>This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networks</b> <p>With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future, pervasive computing and networking research and applications are among the hot topics on the agenda of researchers working on the next generation of mobile communications and networks.</p> <p>This book provides a comprehensive guide to selected topics, both ongoing and emerging, in pervasive computing and networking. It contains contributions from high profile researchers and is edited by leading experts in this field. The main topics covered in the book include pervasive computing and systems, pervasive networking security, and pervasive networking and communication.</p> <p>Key Features:</p> <ul> <li>Discusses existing and emerging communications and computing models, design architectures, mobile and pervasive wireless applications, technology and research challenges in pervasive computing systems, networking and communications</li> <li>Provides detailed discussions of key research challenges and open research issues in the field of autonomic computing and networking</li> <li>Offers information on existing experimental studies including case studies, implementation test-beds in industry and academia</li> <li>Includes a set of PowerPoint slides for each chapter for instructors adopting it as a textbook</li> </ul> <p><i>Pervasive Computing and Networking</i> will be an ideal reference for practitioners and researchers working in the areas of communication networking and pervasive computing and networking. It also serves as an excellent textbook for graduate and senior undergraduate courses in computer science, computer engineering, electrical engineering, software engineering, and information engineering and science.</p>

Diese Produkte könnten Sie auch interessieren:

Pulsed Power
Pulsed Power
von: Gennady A. Mesyats
PDF ebook
309,23 €
High-Frequency Oscillator Design for Integrated Transceivers
High-Frequency Oscillator Design for Integrated Transceivers
von: J. van der Tang, Dieter Kasperkovitz, Arthur H.M. van Roermund
PDF ebook
149,79 €
MEMS Vibratory Gyroscopes
MEMS Vibratory Gyroscopes
von: Cenk Acar, Andrei Shkel
PDF ebook
149,79 €