×







We sell 100% Genuine & New Books only!

Pervasive Systems and Ubiquitous Computing 2013 Edition at Meripustak

Pervasive Systems and Ubiquitous Computing 2013 Edition by Alessandro Genco, Salvatore Sorce , WIT Press

Books from same Author: Alessandro Genco, Salvatore Sorce

Books from same Publisher: WIT Press

Related Category: Author List / Publisher List


  • Price: ₹ 9138.00/- [ 17.00% off ]

    Seller Price: ₹ 7585.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Alessandro Genco, Salvatore Sorce
    PublisherWIT Press
    ISBN9781845644826
    Pages160
    BindingHardback
    LanguageEnglish
    Publish YearDecember 2013

    Description

    WIT Press Pervasive Systems and Ubiquitous Computing 2013 Edition by Alessandro Genco, Salvatore Sorce

    Pervasive systems are today's hardware/software solution to Mark Weiser's 1991 vision of Ubiquitous Computing, with the aim of enabling everyone to enjoy computer services by means of the surrounding environment. Mainly thanks to low cost wireless communication technology and small portable personal devices, pervasive services can now be implemented easily. Advanced local or network applications can be joined everywhere simply by means of a mobile terminal like the ones we already carry (cellular, PDA, smartphone ...). Pervasive systems aim to free people from conventional interaction with desktop and laptop computers and allow a new human-environment interaction to take place on the basis of wireless multimedia communication. This book on pervasive systems discusses the theory fundamentals of pervasive systems as they are currently studied and developed in the most relevant research laboratories. Table of Contents : Chapter 1: Introduction Chapter 2 Augmented Reality and Virtual World From virtual reality to augmented reality;Virtual reality and virtual world; Augmented reality; AR technologies; HMD (head-mounted display); Optical HMD; Video HMD; RSD (retinal scanning display); HHD (handheld display); SAR (spatially augmented reality); SID (spatially immersive display); Augmented tools; AR and VW projects; MediaCups; ActiveSpaces; Access Grid Chapter 3 Human-computer interaction HCI and ubiquitous computing; Classic HCI; Modern HCI; Implicit and explicit HCI; Implicit and explicit HCI: a comparison; Implicit HCI; What is 'context'? Context representations; Explicit HCI; Adaptive and intelligent HCI technologies and methodologies; Perceptive processing; Limbs' movements; Facial data elaboration; Visual perception; Voice perception; Behavioural processing; Cognitive comprehension; Input/output devices; Input devices; Keyboards; Pointing devices; Cameras; Audio input devices; 3D input devices; Output devices; Visual outputs; Aural outputs; Haptic outputs; Usability; Relevance for ubiquitous computing technologies; Usability issues and technology changes; Portability; Why 'information portability'?; Some issues about portability; Chapter 4 Disappearing hardware Invisibility, a key paradigm for ubiquitous systems; User-centric versus desktop-centric systems; Environment-distributed systems; Evolving hardware; Wireless networks; Bluetooth; IrDA; HomeRF; Wi-Fi; Increasing computing power; Increasing memory capacity; High-resolution displays; Building ubiquitous systems; Infrastructure-based systems; Personal systems; Invisibility: problems and limits; Size and power consumption; Control loss and lack of feedback; Breaking the traditional mental model Chapter 5 Wireless technologies for pervasive systems Wireless data transmission; Bluetooth; Piconets; Establishing a Bluetooth connection; Scatternets; The Bluetooth stack; Bluetooth profiles; Wi-Fi; Technical details; IrDA; HomeRF; Wireless technologies comparison; RFID; Passive tags; Active tags; Readers/writers; RFID systems; RFID for pervasive systems Chapter 6 Positioning in pervasive systems Position detection techniques; Triangulation; Lateration; Angulation; Scene analysis; Proximity; Properties and features of positioning systems; Physical vs. symbolic position; Absolute versus relative position; Accuracy versus precision; The range; Identification; Positioning systems; GPS; Active Bat; RADAR; MotionStar magnetic tracker Chapter 7 Security in ubiquitous computing One single word: Security!; Security in information systems; Transient secure association; Security protocols; Guarantees of a security protocol; Confidentiality; Integrity; Non-repudiatebility; Protocols developed for the security of wireless communications; Encryption with static WEP keys; WEP/EAP authentication; Current status: the WPA, the best solution; Encryption; Terminology; Cryptography algorithms; Private key algorithms; Public key algorithms; The technique adopted in practice; Digital signature; Hashing algorithms; Certification; Conclusions on cryptography; Bluetooth architecture; Security levels; Security manager; Ad Hoc networks; Authentication systems; RADIUS; Configuring the RADIUS; Exchanging messages; Kerberos; Other secure authentication systems; Biometrics: definition and fundamental components; Hardware keys; Smarts cards; Proximity tools; WAP/UMTS communication as a system of authentication; WTLS; Weaknesses and attack methods; Deliberate attacks; Sniffing; Denial of service attack; Distributed denial of service; Sleep deprivation torture; MAC address spoofing; Attacks on Smart Cards; Security on wireless channels; Bluetooth; Eavesdropping and impersonation; Location attacks; WLANs; Breaking WEP keys; AirSnort; WEPCrack Chapter 8 Service discovery Data transmission in ubiquitous systems; Objectives; Model of ubiquitous node server; Disk and server scheduling algorithms; The ADoRe algorithm; The Flush algorithm; The OWeiST algorithm; The RxW/S algorithm; Cache memory in a server node; LF-LRU algorithm; LRU-K algorithm; Considerations on the use of a finite speed transmission channel; Context-awareness; What is context-awareness?; Possible applications



    Book Successfully Added To Your Cart