This book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically sound ways of introducing ICT, new technical artifacts supporting the approach, the evaluation in a large-scale validator, and future work. While many innovations in Technology Enhanced Learning (TEL) have emerged over the last two decades, the uptake of these inno…
This book covers the issues of monitoring, failure localization, and restoration in the Internet optical backbone, and focuses on the progress of state-of-the-art in both industry standard and academic research. The authors summarize, categorize, and analyze the developed technology in the context of Internet fault management and failure recovery under the Generalized Multi-Protocol Label Switc…
The book reports two approaches of implementation of the essential components of a Digital Phase Locked Loop based system for dealing with wireless channels showing Nakagami-m fading. It is mostly observed in mobile communication. In the first approach, the structure of a Digital phase locked loop (DPLL) based on Zero Crossing (ZC) algorithm is proposed. In a modified form, the structure of a D…
Charles Edge and Bill Smith provide detailed explanations of the technology required for large-scale Mac OS X deployments and show you how to integrate it with other operating systems and applications. Now in its second edition, Enterprise Mac Administrator's Guide addresses the growing size and spread of Mac OS X deployments in corporations and institutions worldwide. In some cases, this is…
A concise reference to the state of the art in systems interoperability, Enterprise Interoperability VII will be of great value to engineers and computer scientists working in manufacturing and other process industries and to software engineers and electronic and manufacturing engineers working in the academic environment. Furthermore, it shows how knowledge of the meaning within information an…
Featuring numerous case examples from companies around the world, this second edition integrates theoretical advances and empirical data with practical applications, including in-depth discussion on the COBIT 5 framework which can be used to build, measure and audit enterprise governance of IT approaches. At the forefront of the field, the authors of this volume draw from years of research and …
This book constitutes the proceedings of the 15th International Conference on Transport Systems Telematics, TST 2015, held in Wrocław, Poland, in April 2015. The 35 revised full papers and two short papers included in this volume were carefully reviewed and selected from 115 submissions. The papers provide an overview of solutions being developed in the fields of transport telematics and inte…
This book explains how to combine and exploit sensor networks and internet-of-things (IoT) technologies and Web-service design patterns to enrich and integrate Building Information Models (BIMs). It provides approaches and software architectures for facilitating the interaction with (and between) BIMs through Web services, and for enabling and facilitating the fusion of the information residing…
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measuremen…
This SpringerBrief provides state-of-the-art technical reviews on self-organizing and optimization in 5G systems. It covers the latest research results from physical-layer channel modeling to software defined network (SDN) architecture. This book focuses on the cutting-edge wireless technologies such as heterogeneous networks (HetNets), self-organizing network (SON), smart low power node (LPN),…