This monograph introduces methods for handling filtering and control problems in nonlinear stochastic systems arising from network-induced phenomena consequent on limited communication capacity. Such phenomena include communication delay, packet dropout, signal quantization or saturation, randomly occurring nonlinearities and randomly occurring uncertainties. The text is self-contained, begi…
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechan…
This monograph presents original research results on selected problems of dependability in contemporary Complex Information Systems (CIS). The ten chapters are concentrated around the following three aspects: methods for modelling of the system and its components, tasks? or in more generic and more adequate interpretation, functionalities? accomplished by the system and conditions for their cor…
Includes cases based on the author’s own 10-year experience working in emergency contexts with displaced populations in 11 countries across the world. Focuses on the mental health of displaced populations from a uniquely psychological, sociocultural, and ecological perspective. Provides practical applications for non-specialist professionals working with displaced populations in complex ins…
This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many cases, the providers’ decision makers significantly underestimate their services’ IT security risk ex…
This SpringerBrief examines anti-jamming transmissions in cognitive radio networks (CRNs), including several recent related research topics within this field. The author introduces the transmissions based on uncoordinated spread spectrum to address smart jammers in CRNs. The author applies game theory to investigate the interactions between secondary users and jammers while providing game th…
This textbook presents the mathematical theory and techniques necessary for analyzing and modeling high-performance global networks, such as the Internet. The three main building blocks of high-performance networks are links, switching equipment connecting the links together and software employed at the end nodes and intermediate switches. This book provides the basic techniques for modeling an…
My hope in creating this open source text is to provide a practical resource for students to develop a basic knowledge of various techniques and skills currently used in the social work field. In the spirit of collaboration and reclaiming our education, this is a text that is put together by students for students. It is not an all encompassing educational guide to therapy. It is meant to be a b…
This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: · minimum data rate f…
Uses a multilevel structure to combine insights on family outcomes Examines supra-national organisations such as the European Commission, the Organisation for Economic Co-operation and Development (OECD), the World Bank (WB), the International Labour Organisation (ILO) and the United Nations (UN) Brings together representatives from various academic communities to form a coherent, interdiscip…