Muutke küpsiste eelistusi

E-raamat: Mobile Intelligence

(Department of Computer Science, St. Francis Xavier University, Canada)
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 192,60 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Mobile intelligence, or the application of computational intelligence approaches to the mobile computing paradigm, holds the promise of benefiting a wide variety of applications including database query processing, multimedia, network security, information retrieval, commerce systems, and search engines, according to Yang (St. Francis Xavier U., Canada), Waluyo (Monash U., Australia), Ma (Hosei U., Japan), Tan (Australian Council for Educational Research, Australia), and Srinivasan (Monash U., Australia), who present the state-of-the-art of this combined field in a range of applications within the research domains of mobile data and intelligence, location-based mobile information services, mobile mining, mobile context-aware and applications, mobile intelligence security, mobile multimedia, and intelligent network. Annotation ©2010 Book News, Inc., Portland, OR (booknews.com)

* Focuses on learning patterns and knowledge from data generated by mobile users and mobile technology.
* Covers research and application issues in applying computational intelligence applications to mobile computing
* Delivers benefits to a wide range of applications
* Introduces the state of the art of computational intelligence to the mobile paradigm

Muu info

Commended for PROSE (Engineering/Technology) 2010.
Preface ix
Contributors xv
Part I Mobile Data and Intelligence
A Survey of State-of-the-Art Routing Protocols for Mobile Ad Hoc Networks
3(23)
Connected Dominating Set for Topology Control in Ad Hoc Networks
26(17)
An Intelligent Way to Reduce Channel Under-utilization in Mobile Ad Hoc Networks
43(19)
Mobility in Publish/Subscribe Systems
62(25)
Cross-Layer Design Framework for Adaptive Cooperative Caching in Mobile Ad Hoc Networks
87(19)
Recent Advances in Mobile Agent-Oriented Applications
106(37)
Part II Location-Based Mobile Information Services
KCLS: A Cluster-Based Location Service Protocol and Its Applications in Multihop Mobile Networks
143(20)
Predictive Location Tracking in Cellular and in Ad Hoc Wireless Networks
163(28)
An Efficient Air Index Scheme for Spatial Data Dissemination in Mobile Computing Environments
191(22)
Next Generation Location-based Services: Merging Positioning and Web 2.0
213(26)
Part III Mobile Mining
Data Mining for Moving Object Databases
239(25)
Mobile Data Mining on Small Devices Through Web Services
264(15)
Part IV Mobile Context-Aware and Applications
Context Awareness: A Formal Foundation
279(15)
Experiences with a Smart Office Project
294(26)
An Agent-Based Architecture for Providing Enhanced Communication Services
320(25)
Part V Mobile Intelligence Security
MANET Routing Security
345(35)
An Online Scheme for Threat Detection Within Mobile Ad Hoc Networks
380(32)
SMRTI: Secure Mobile Ad Hoc Network Routing with Trust Intrigue
412(25)
Managing Privacy in Location-based Access Control Systems
437(34)
Part VI Mobile Multimedia
Voice XML-Enabled Intelligent Mobile Services
471(17)
User Adaptive Video Retrieval on Mobile Devices
488(22)
A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-based Service Environment
510(20)
Energy Efficiency for Mobile Multimedia Replay
530(19)
Part VII Intelligent Network
Efficient Data-Centric Storage Mechanisms in Wireless Sensor Networks
549(24)
Tracking in Wireless Sensor Networks
573(22)
DDoS Attack Modeling and Detection in Wireless Sensor Networks
595(32)
Energy-Efficient Pattern Recognition for Wireless Sensor Networks
627(34)
Index 661
LAURENCE T. YANG is a Professor in the Department of Computer Science, St. Francis Xavier University, Canada.

AGUSTINUS BORGY WALUYO is a Researcher at the Centre for Distributed Systems and Software Engineering, Mobility Lab, Monash University, Australia.

JIANHUA MA is a Professor in the Faculty of Computer and Information Sciences of Hosei University, Japan.

LING TAN is a Research Fellow at the Assessment and Reporting division of the Australian Council for Educational Research.

BALA SRINIVASAN is a Professor of Information Technology and head of the Clayton School of Information Technology in the Faculty of Information Technology, Monash University, Australia.