This Springer Brief investigates spectrum sharing with limited channel feedback in various cognitive radio systems, such as point-to-point, broadcast scheduling and ad-hoc networks. The design aim is to optimally allocate the secondary resources to improve the throughput of secondary users while maintaining a certain quality of service for primary users. The analytical results of optimal resour…
This book constitutes the proceedings of the Second OpenSHMEM Workshop, held in Annapolis, MD, USA, in August 2015.The 12 technical papers and one short position papers presented in this book were carefully reviewed and selected from 17 submissions. The topics of the workshop included extensions to the OpenSHMEM API, implementation of the API for current and emerging architectures, tools to deb…
Learn how routers network using the OSPF (Open Shortest Path First) protocol and unpick Dijkstra’s Network Algorithm to see how OSPF performs the calculations to determine the shortest or most appropriate path between two routers. OSPF: A Network Routing Protocol dives deep into the OSPF protocol without sacrificing simplicity in language. All of this is done with running examples and illustr…
This book describes recent innovations in 3D media and technologies, with coverage of 3D media capturing, processing, encoding, and adaptation, networking aspects for 3D Media, and quality of user experience (QoE). The contributions are based on the results of the FP7 European Project ROMEO, which focuses on new methods for the compression and delivery of 3D multi-view video and spatial audio, …
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechan…
This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many cases, the providers’ decision makers significantly underestimate their services’ IT security risk ex…
This SpringerBrief examines anti-jamming transmissions in cognitive radio networks (CRNs), including several recent related research topics within this field. The author introduces the transmissions based on uncoordinated spread spectrum to address smart jammers in CRNs. The author applies game theory to investigate the interactions between secondary users and jammers while providing game th…
This textbook presents the mathematical theory and techniques necessary for analyzing and modeling high-performance global networks, such as the Internet. The three main building blocks of high-performance networks are links, switching equipment connecting the links together and software employed at the end nodes and intermediate switches. This book provides the basic techniques for modeling an…
This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: · minimum data rate f…
This book constitutes thoroughly revised and selected papers from the Second International Congress on Sports Science Research and Technology Support, icSPORTS 2014, held in Rome, Italy, in October 2014. The 8 thoroughly revised and extended papers presented in this volume were carefully reviewed and selected from originally 131 submissions.