Subscribe to our newsletter:

Computer Systems Organization

View as
Sort by
Display per page

European Research Activities in Cloud Computing

What’s new in the European research and development area? Cloud computing is a provision model where whatever computing resource that can be thought of (machines, network, software solutions, applications) is provided as a service. This new paradigm has changed the center of gravity of computing in both the academic and industry en...

Internet Tomography

Internet tomography, introduced from basic principles through to techniques, tools and applications, is the subject of this book. The design of Internet Tomography Measurement Systems (ITMS) aimed at mapping the Internet performance profile spatially and temporally over paths between probing stations is a particular focus.The Inter...

Biometric Security

Modern biometrics delivers an enhanced level of security by means of a “proof of property”. The design and deployment of a biometric system, however, hide many pitfalls, which, when underestimated, can lead to major security weaknesses and privacy threats. Issues of concern include biometric identity theft and privacy invasion beca...

A Name To Exist

In the Iliad and the Odyssey, song IX, Ulysses chooses the anthroponomy “Nobody” to escape the Cyclops. This onomastic game operates on two levels of meaning: the first referring to the anthroponomical fact, and the second to the lexicon, more specifically, to the common name. Ahead of his time, Ulysses would have surfed the Intern...

Enhanced On-Demand Multipath Routing for Wireless Networks

The Ad-hoc On-demand Multipath Distance Vector (AOMDV) routing protocol is widely used in highly dynamic ad-hoc networks because of its generic features. The transmission of reliable energy efficient data is an emerging issue in AOMDV routing as the nodes are prone to link failures and route breaks in highly dynamic ad-hoc networks...

Selected Readings in Cybersecurity

This collection of papers highlights the current state of the art of cybersecurity. It is divided into five major sections: humans and information security; security systems design and development; security systems management and testing; applications of information security technologies; and outstanding cybersecurity technology de...

Second Generation Mainframes

Second Generation Mainframes: The IBM 7000 Series describes IBM’s second generation of mainframe computers which introduced new technology, new peripherals and advanced software. These systems were continuations of the instruction sets of the IBM 700 series with significant enhancements, but supported upwards compatibility that pre...