You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
The thoroughly refereed postproceedings of the International Workshop on Architectures for Quality of Service in the Internet, Art-QoS 2003, held in Warsaw, Poland, in March 2003. The 22 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on architectures for next generation networks, architectures and services, signalling, admission control, AQUILA-resource control, AQUILA-QoS at work, MPLS traffic engineering, and traffic control mechanisms.
Workplace technology is evolving at an accelerated pace, driving innovation, productivity, and efficiency to exceedingly high levels. Businesses both small and large must keep up with these changes in order to compete effectively with fellow enterprises. The Handbook of Research on Enterprise 2.0: Technological, Social, and Organizational Dimensions collects the most recent developments in evaluating the technological, organizational, and social dimensions of modern business practices in order to better foster advances in information exchange and collaboration among networks of partners and customers. This crucial reference supports managers and business professionals, as well as members of academia, IT specialists, and network developers in enhancing business practices and obtaining competitive advantage.
USM 2000 is the third event in a series of international IFIP/GI conferences on Trends in Distributed Systems. Following the venues in Aachen, Germany (1996) and Hamburg, Germany (1998), this event in Munich considers the trend towards a Universal Service Market – USM 2000. The trend towards a universal service market has many origins, e.g., the integration of telecom and data communications, the deregulation e?orts with respect to telco markets, the globalization of information, the virtualization of companies, the requirement of a short time-to-market, the advances in network technologies, the increasing acceptance of e-commerce, and the increase in - bility. This leads to new business-t...
The growth of telecommunications has been largely based on mobile and data services in the past 10 years and the growth will continue. For instance, it is forecasted that after 2005 the mobile traffic turnover in Europe will exceed that of fixed telephone traffic and the penetration of Internet access through mobile will exceed that of fixed access. It is expected that the new value added services will be Internet-based and the IP traffic will outweigh the amount of traditional ISDN based telephone traffic. The transition from the existing telecommunications services to mobile and Internet based ones will change the service infrastructure as well as the customer and service management struct...
Patients and medical professionals alike are slowly growing into the digital advances that are revolutionizing the ways that medical records are maintained in addition to the delivery of healthcare services. As technology continues to advance, so do the applications of technological innovation within the healthcare sector. The Encyclopedia of E-Health and Telemedicine is an authoritative reference source featuring emerging technological developments and solutions within the field of medicine. Emphasizing critical research-based articles on digital trends, including big data, mobile applications, electronic records management, and data privacy, and how these trends are being applied within the healthcare sector, this encyclopedia is a critical addition to academic and medical libraries and meets the research needs of healthcare professionals, researchers, and medical students.
This text addresses the issues in particular order and provides the results of IS & N projects addressing those issues in a synthesized manner, so that the reader can gain insights into the European projects contribution towards the telecommunications software industry.
"This book identifies key issues in the relationship between ICT and law, ethics, politics and social policy, drawing attention to diverse global approaches to the challenges posed by ICT to access rights"--Provided by publisher.
In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. The Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere. Bridging research and practical application, this comprehensive reference source is ideally designed for use by investigators, computer forensics practitioners, and experts in ICT law, as well as academicians in the fields of information security and criminal science.
"This 10-volume compilation of authoritative, research-based articles contributed by thousands of researchers and experts from all over the world emphasized modern issues and the presentation of potential opportunities, prospective solutions, and future directions in the field of information science and technology"--Provided by publisher.
The internet is established in most households worldwide and used for entertainment purposes, shopping, social networking, business activities, banking, telemedicine, and more. As more individuals and businesses use this essential tool to connect with each other and consumers, more private data is exposed to criminals ready to exploit it for their gain. Thus, it is essential to continue discussions involving policies that regulate and monitor these activities, and anticipate new laws that should be implemented in order to protect users. Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications examines current internet and data protection laws and their impact on user experience and cybercrime, and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats. Highlighting a range of topics such as online privacy and security, hacking, and online threat protection, this multi-volume book is ideally designed for IT specialists, administrators, policymakers, researchers, academicians, and upper-level students.