This book provides research findings and practical information on online communication strategies in politics. Based on communication research and real-world political-campaign experience, the author examines how to use the Web and social media to create public visibility, build trust and consensus and boost political participation. It offers a useful guide for practitioners working in the poli…
Learn how routers network using the OSPF (Open Shortest Path First) protocol and unpick Dijkstra’s Network Algorithm to see how OSPF performs the calculations to determine the shortest or most appropriate path between two routers. OSPF: A Network Routing Protocol dives deep into the OSPF protocol without sacrificing simplicity in language. All of this is done with running examples and illustr…
This book presents a comprehensive mathematical approach for solving stochastic magnetic field problems. It discusses variability in material properties and geometry, with an emphasis on the preservation of structural physical and mathematical properties. It especially addresses uncertainties in the computer simulation of magnetic fields originating from the manufacturing process. Uncertainties…
This book describes recent innovations in 3D media and technologies, with coverage of 3D media capturing, processing, encoding, and adaptation, networking aspects for 3D Media, and quality of user experience (QoE). The contributions are based on the results of the FP7 European Project ROMEO, which focuses on new methods for the compression and delivery of 3D multi-view video and spatial audio, …
This monograph introduces methods for handling filtering and control problems in nonlinear stochastic systems arising from network-induced phenomena consequent on limited communication capacity. Such phenomena include communication delay, packet dropout, signal quantization or saturation, randomly occurring nonlinearities and randomly occurring uncertainties. The text is self-contained, begi…
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechan…
What does it mean to be media literate in today’s world? How are we transformed by the many media infrastructures around us? We are immersed in a world mediated by information and communication technologies (ICTs). From hardware like smartphones, smartwatches, and home assistants to software like Facebook, Instagram, Twitter, and Snapchat, our lives have become a complex, interconnected netwo…
This book purports to examine the international dimensions of the democratization process in Egypt in the post Cold War era; a theme which acquired significance at the academic and policy-oriented levels in light of the growing internationalization of reform arrangements in the Arab world in post 9/11 and the greater involvement of external powers in Arab politics following the Arab Spring upri…
This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many cases, the providers’ decision makers significantly underestimate their services’ IT security risk ex…
This SpringerBrief examines anti-jamming transmissions in cognitive radio networks (CRNs), including several recent related research topics within this field. The author introduces the transmissions based on uncoordinated spread spectrum to address smart jammers in CRNs. The author applies game theory to investigate the interactions between secondary users and jammers while providing game th…