De som köpt den här boken har ofta också köpt The Anxious Generation av Jonathan Haidt (inbunden).
Köp båda 2 för 1533 krProfessor Mohammad Obaidat, Monmouth University, USA Mohammad Obaidat received his Ph.D. and M. S. degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. Dr. Obaidat is currently a full Professor of Computer Science at Monmouth University, NJ, USA. Among his previous positions are Chair of the Department of Computer Science and Director of the Graduate Program at Monmouth University and a faculty member at the City University of New York. Professor Mieso Denko, University of Guelph, Canada Mieso Denko received his MSc form the University of Wales, UK, and his PhD from the University of Natal, South Africa, both in Computer Science. Since November 2002, Dr. Denko has been with the Department of Computing and Information Science, Guelph, Ontario, Canada, where he is now an Associate Professor. Dr. Isaac Woungang, Ryerson University, Canada Isaac Woungang received his M.Sc and Ph.D degrees all in Mathematics from Universit de la Mditerrane-Aix Marseille II, Luminy, France, and Universit du Sud, Toulon-Var, France, in 1990 and 1994 respectively. In 1999, he received an M.A.Sc from the INRS-nergie, Matriaux et Tlcommunications, University of Quebec, Montreal, Canada. From 1999 to 2002, he worked as a Software engineer at Nortel Networks. Since 2002, he has been with the Department of Computer Science at Ryerson University.
List of Contributors About the Editors PART ONE PERVASIVE COMPUTING AND SYSTEMS 1 Introduction Mohammad S. Obaidat and Isaac Woungang 1.1 Pervasive Computing and Its Significance 1.2 Research Trends in Pervasive Computing and Networking 1.3 Scanning the Book 1.4 Target Audience 1.5 Supplementary Resources 1.6 Acknowledgments References 2 Tools and Techniques for Dynamic Reconfiguration and Interoperability of Pervasive Systems Evens Jean, Sahra Sedigh, Ali R. Hurson, and Behrooz A. Shirazi 2.1 Introduction. 2.2 Mobile Agent Technology 2.3 Sensor Networks 2.4 Collaboration and Interoperability Among Sensor Networks 2.5 Applications 2.6 Conclusion References 3 Models for Service and Resource Discovery in Pervasive Computing Mehdi Khouja, Carlos Juiz, Ramon Puigjaner, and Farouk Kamoun 3.1 Introduction 3.2 Service Oriented Architecture 3.3 Industry and Consortia Supported Models for Service Discovery 3.4 Research Initiatives in Service Discovery for Pervasive Systems 3.5 Conclusions References 4 Pervasive Learning Tools and Technologies Neil Y. Yen, Qun Jin, Hiroaki Ogata, Timothy K. Shih, and Y. Yano 4.1 Introduction 4.2 Pervasive Learning: A Promising Innovative Paradigm 4.3 Emerging Technologies and Systems for Pervasive Learning 4.4 Integration of Real-World Practice and Experience with Pervasive Learning 4.5 Nature of Pervasive Learning and Provision of Well-Being in Education 4.6 Conclusion References 5 Service Management in Pervasive Computing Environments Jiannong Cao, Joanna Siebert, and Vaskar Raychoudhury 5.1 Introduction 5.2 Service Management in Pervasive Computing Environments 5.3 Techniques for Service Management in PvCE 5.4 Service Composition 5.5 Conclusions References 6 Wireless Sensor Cooperation for a Sustainable Quality of Information Abdelmajid Khelil, Christian Reinl, Brahim Ayari, Faisal Karim Shaikh, Piotr Szczytowski, Azad Ali, and Neeraj Suri 6.1 Introduction 6.2 Sensing the Real World 6.3 Inter-Sensor Cooperation 6.4 Mobile Sensor Cooperation 6.5 Cooperation Across Mobile Entities 6.6 Inter-WSN Cooperation 6.7 Conclusions and Future Research Directions References 7 An Opportunistic Pervasive Networking Paradigm: Multi-Hop Cognitive Radio Networks Didem Gozupek and Fatih Alagoz 7.1 Introduction 7.2 Overview of Multi-Hop Cognitive Radio Networks MAC Layer 7.3 Proposed Mac Layer Protocols 7.4 Open Issues 7.5 Conclusions References 8 Wearable Computing and Sensor Systems for Healthcare Franca Delmastro and Marco Conti 8.1 Introduction 8.2 The Health Body Area Network 8.3 Medical and Technological Requirements of Health Sensors 8.4 Wearable Sensors for Vital Signals Monitoring 8.5 Wearable Sensors for Activity Recognition 8.6 Sensors and Signals for Emotion Recognition 8.7 Intra-BAN Communications in Pervasive Healthcare Systems: Standards and Protocols 8.8 Conclusions References 9 Standards and Implementation of Pervasive Computing Applications Daniel Cascado, Jose Luis Sevillano, Luis Fernandez-Luque, Karl Johan Grttum, L. Kristian Vognild, and T. M. Burkow 9.1 Introduction 9.2 Wireless Technologies and Standards 9.3 Middleware 9.4 Case Studies References PART TWO PERVASIVE NETWORKING SECURITY. 10 Security and Privacy in Pervasive Networks Tarik Guelzim and Mohammad S. Obaidat 10.1 Introduction 10.2 Security Classics 10.3 Hardening Pervasive Networks 10.4 Privacy in Pervasive Networks 10.5 Conclusion References 11 UnderstandingWormhole Attacks in Pervasive Networks Isaac Woungang, Sanjay Kumar Dhurandher, and Abhishek Gupta 11.1 Introduction 11.2 A Wormhole Attack 11.3 Severity of a Wormhole Attack 11.4 Background 11.5 Classification of Wormholes 11.6 Wormhole Attack Modes 11.7 Mitigating Wormhole Attacks 11.8 Discussion of Some Mitigating Solutions to Avoid Wormhole Attacks 11.9 Conclus