Jason A Mull

Learn More
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new,(More)
This chapter aims to be a high-level introduction into the fundamental concepts of both digital forensic investigations and cloud computing for non-experts in one or both areas. Once fundamental concepts are established, this work begins to examine cloud computing security-related questions, specifically how past security challenges are inherited or solved(More)
The amount of data acquired, stored, and processed annually over the Internet has exceeded the processing capabilities of modern computer systems, including supercomputers with multiple-Petaflop processing power, giving rise to the term Big Data. Continuous research efforts to implement systems to cope with this insurmountable amount of data are underway.(More)
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new,(More)
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new,(More)
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new,(More)
In this chapter, the authors present the performance of multi-antenna selective combining decode-andforward (SC-DF) relay networks over independent and identically distributed (i.i.d) Nakagami-m fading channels. The outage probability, moment generation function, symbol error probability and average channel capacity are derived in closed-form using the(More)
Online virtual worlds and games provide opportunities for new kinds of interaction, and new forms of play and learning, and they are becoming a common feature in the lives of many children and young people. This chapter explores the issues that this sort of virtual play raises for researchers and educators, and the main themes that have emerged through(More)