C programming is a craft that takes years to perfect. A reasonably sharp person can learn the basics of
C quite quickly. But it takes much longer to master the nuances of the language and to write enough
programs, and enough different programs, to become an expert. In natural language terms, this is the
difference between being able to order a cup of coffee in Paris, and (on the Metro) being able to tell anative Parisienne where to get off. This book is an advanced text on the ANSI C programming
language. It is intended for people who are already writing C programs, and who want to quickly pick
up some of the insights and techniques of Experts.
This book provides technical information about all aspects of 3GPP LTE. The areas
covered range from basic concepts to research-grade material, including future
directions. The book captures the current state of 3GPP LTE technology and serves
as a source of comprehensive reference material on this subject. It has a total of
12 chapters authored by 50 Experts from around the world. The targeted audi-
ence includes professionals who are designers or planners for 3GPP LTE systems,
researchers (faculty members and graduate students), and those who would like to
learn about this field.
When the authors of this book asked me to write the foreword of
their work on the digital enterprise, I immediately thought that it was
one more document on a fashionable topic in the technology and the
business world of the 21st Century often addressed by consulting
firms, some of which have aspired to become Experts on the subject.
However, a more careful observation reveals that an issue more
important than the sole subject of the digital enterprise is: “Is your
company fully operational?”, because this is the real topic.
Theartofcomputationofelectromagnetic(EM)problemshasgrownexponentially
for three decades due to the availability of powerful computer resources. In spite of
this, the EM community has suffered without a suitable text on the computational
techniques commonly used in solving EM-related problems. Although there have
been monographs on one particular technique or another, the monographs are written
for the Experts rather than students. Only a few texts cover the major techniques and
dothatinamannersuitableforclassroomuse.ItseemsExpertsinthisareaarefamiliar
with one or a few techniques but not many seem to be familiar with all the common
techniques. This text attempts to fill that gap.
The following sections profile many of the vendors in the NFV market. The individual profiles were created
through a collaborative effort between SDNCentral’s Research Team and the Vendor’s product Experts.
SDNCentral worked under the assumption the information provided by the vendors was factual, auditing the
submissions only to remove unverifiable claims and hyperbole. Extended profiles can be viewed online.
While every attempt has been made to validate the capabilities listed in the profiles, SDNCentral advises end
users to verify the veracity of each claim for themselves in their actual deployment environments. SDNCentral
cannot be held liable for unexpected operations, damages or incorrect operation due to any inaccuracies listed
here. SDNCentral welcomes feedback and additional information from end users based on their real-world
experiences with the products and technologies listed. The SDNCentral research team can be reached at
Developers, manufacturers and marketers of products incorporating short-
range radio systems are Experts in their fields—security, telemetry,
medical care, to name a few. Often they add a wireless interface just to
eliminate wires on an existing wired product. They may adapt a wireless
subsystem, which is easy to integrate electrically into their system, only to
find that the range is far short of what they expected, there are frequent
false alarms, or it doesn’t work at all. It is for these adapters of wireless
subsystems that this book is primarily intended.
Having dealt with in-depth analysis of SS#7, GSM and GPRS networks I started to monitor
UTRAN interfaces approximately four years ago. Monitoring interfaces means decoding
the data captured on the links and analysing how the different data segments and messages
are related to each other. In general I wanted to trace all messages belonging to a single
call to prove if the network elements and protocol entities involved worked fine or if there
had been failures or if any kind of suspicious events had influenced the normal call
proceeding or the call’s quality of service. Cases showing normal network behaviour have
been documented in Kreher and Ruedebusch (UMTS Signaling. John Wiley & Sons, Ltd,
2005), which provides examples for technical Experts investigating call flows and network
procedures.
The past decade has seen an explosion of machine learning research and appli-
cations; especially, deep learning methods have enabled key advances in many
applicationdomains,suchas computervision,speechprocessing,andgameplaying.
However, the performance of many machine learning methods is very sensitive
to a plethora of design decisions, which constitutes a considerable barrier for
new users. This is particularly true in the booming field of deep learning, where
human engineers need to select the right neural architectures, training procedures,
regularization methods, and hyperparameters of all of these components in order to
make their networks do what they are supposed to do with sufficient performance.
This process has to be repeated for every application. Even Experts are often left
with tedious episodes of trial and error until they identify a good set of choices for
a particular dataset.