![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This book constitutes the refereed proceedings of the 4th International Conference on Computational and Corpus-Based Phraseology, Europhras 2022, held in Malaga, Spain, in September 2022.The 16 full papers presented in this book were carefully reviewed and selected from 59 submissions. The papers in this volume cover a number of topics including general corpus-based approaches to phraseology, phraseology in translation and cross-linguistic studies, phraseology in language teaching and learning, phraseology in specialized languages, phraseology in lexicography, cognitive approaches to phraseology, the computational treatment of multiword expressions, and the development, annotation, and exploitation of corpora for phraseological studies.
This book constitutes the selected papers from the scientific satellite events held in conjunction with the19th International Conference on Service-Oriented Computing, ICSOC 2021. The conference was held Dubai, United Arab Emirates in November 2021.This year, these satellite events were organized around three main tracks, including a workshop track, a demonstration track, and a tutorials track. The ICSOC 2021 workshop track consisted of the following three workshops covering a wide range of topics that fall into the general area of service computing. * International Workshop on Artificial Intelligence for IT Operations (AIOps) * 3rd Workshop on Smart Data Integration and Processing (STRAPS 2021) * International Workshop on AI-enabled Process Automation (AI-PA 2021)
This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.
This book constitutes the proceedings of the 13th International Conference on Security and Cryptography for Networks, SCN 2022, held in Amalfi, Italy, in September 2022. The 33 full papers presented in this volume were carefully reviewed and selected from 101 submissions. They are organized in topical sections: Ciphers, Cryptanalysis, Defenses; Public Key Encryption; Authentication and Signatures, Multiparty Computation; Zero-Knowledge Proofs and Applications.
This book constitutes the refereed proceedings of the 21st IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2022, which took place Newcastle-upon-Tyne, UK, in September 2022. The 37 papers presented in this volume were carefully reviewed and selected from 72 submissions. They were organized in topical sections as follows: Artificial intelligence; Data and Analytics; Careers and ICT; Digital Innovation and Transformation; Electronic Services; Health and Wellbeing; Pandemic; Privacy, Trust and Security.
This book constitutes the proceedings of the 20th International Conference on Web Engineering, ICWE 2020, which was planned to take place in Helsinki, Finland, during June 9-12, 2020. Due to the corona pandemic the conference changed to a virtual format. The total of 24 full and 10 short contributions presented in this volume were carefully reviewed and selected from 78 submissions. The book also contains 4 PhD and 7 demo papers. The papers were organized in topical sections named: User interface technologies; performance of Web technologies; machine learning; testing of Web applications; emotion detection; location-aware applications; sentiment analysis; open data; liquid Web applications; Web-based learning; PhD symposium; demos and posters.
This book describes the next generation of industry-Industry 4.0-and how it holds the promise of increased flexibility in manufacturing, along with automation, better quality, and improved productivity. The authors discuss how it thus enables companies to cope with the challenges of producing increasingly individualized products with a short lead-time to market and higher quality. The authors posit that intelligent cloud services and resource sharing play an important role in Industry 4.0 anticipated Fourth Industrial Revolution. This book serves the different issues and challenges in cloud resource management CRM techniques with proper propped solution for IT organizations. The book features chapters based on the characteristics of autonomic computing with its applicability in CRM. Each chapter features the techniques and analysis of each mechanism to make better resource management in cloud.
This beginning graduate textbook describes both recent achievements and classical results of computational complexity theory. Requiring essentially no background apart from mathematical maturity, the book can be used as a reference for self-study for anyone interested in complexity, including physicists, mathematicians, and other scientists, as well as a textbook for a variety of courses and seminars. More than 300 exercises are included with a selected hint set. The book starts with a broad introduction to the field and progresses to advanced results. Contents include: definition of Turing machines and basic time and space complexity classes, probabilistic algorithms, interactive proofs, cryptography, quantum computation, lower bounds for concrete computational models (decision trees, communication complexity, constant depth, algebraic and monotone circuits, proof complexity), average-case complexity and hardness amplification, derandomization and pseudorandom constructions, and the PCP theorem.
It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting approaches. It will be useful as a graduate level introduction, also for self-study by researchers and professionals, and the examples are taken from real-world datasets.
This volume constitutes the refereed and revised post-conference proceedings of the 5th IFIP WG 5.15 International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2020, in Sofia, Bulgaria, in December 2020.* The 18 full papers and 6 short papers presented were carefully reviewed and selected from 52 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, remote sensing, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, disaster risk assessment and management. *The conference was held virtually.
The five-volume set IFIP AICT 630, 631, 632, 633, and 634 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2021, held in Nantes, France, in September 2021.*The 378 papers presented were carefully reviewed and selected from 529 submissions. They discuss artificial intelligence techniques, decision aid and new and renewed paradigms for sustainable and resilient production systems at four-wall factory and value chain levels. The papers are organized in the following topical sections: Part I: artificial intelligence based optimization techniques for demand-driven manufacturing; hybrid approaches for production planning and scheduling; intelligent systems for manufacturing planning and control in the industry 4.0; learning and robust decision support systems for agile manufacturing environments; low-code and model-driven engineering for production system; meta-heuristics and optimization techniques for energy-oriented manufacturing systems; metaheuristics for production systems; modern analytics and new AI-based smart techniques for replenishment and production planning under uncertainty; system identification for manufacturing control applications; and the future of lean thinking and practice Part II: digital transformation of SME manufacturers: the crucial role of standard; digital transformations towards supply chain resiliency; engineering of smart-product-service-systems of the future; lean and Six Sigma in services healthcare; new trends and challenges in reconfigurable, flexible or agile production system; production management in food supply chains; and sustainability in production planning and lot-sizing Part III: autonomous robots in delivery logistics; digital transformation approaches in production management; finance-driven supply chain; gastronomic service system design; modern scheduling and applications in industry 4.0; recent advances in sustainable manufacturing; regular session: green production and circularity concepts; regular session: improvement models and methods for green and innovative systems; regular session: supply chain and routing management; regular session: robotics and human aspects; regular session: classification and data management methods; smart supply chain and production in society 5.0 era; and supply chain risk management under coronavirus Part IV: AI for resilience in global supply chain networks in the context of pandemic disruptions; blockchain in the operations and supply chain management; data-based services as key enablers for smart products, manufacturing and assembly; data-driven methods for supply chain optimization; digital twins based on systems engineering and semantic modeling; digital twins in companies first developments and future challenges; human-centered artificial intelligence in smart manufacturing for the operator 4.0; operations management in engineer-to-order manufacturing; product and asset life cycle management for smart and sustainable manufacturing systems; robotics technologies for control, smart manufacturing and logistics; serious games analytics: improving games and learning support; smart and sustainable production and supply chains; smart methods and techniques for sustainable supply chain management; the new digital lean manufacturing paradigm; and the role of emerging technologies in disaster relief operations: lessons from COVID-19 Part V: data-driven platforms and applications in production and logistics: digital twins and AI for sustainability; regular session: new approaches for routing problem solving; regular session: improvement of design and operation of manufacturing systems; regular session: crossdock and transportation issues; regular session: maintenance improvement and lifecycle management; regular session: additive manufacturing and mass customization; regular session: frameworks and conceptual modelling for systems and services efficiency; regular session: optimization of production and transportation systems; regular session: optimization of supply chain agility and reconfigurability; regular session: advanced modelling approaches; regular session: simulation and optimization of systems performances; regular session: AI-based approaches for quality and performance improvement of production systems; and regular session: risk and performance management of supply chains *The conference was held online.
This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.
This eighteenth volume in the Poincare Seminar Series provides a thorough description of Information Theory and some of its most active areas, in particular, its relation to thermodynamics at the nanoscale and the Maxwell Demon, and the emergence of quantum computation and of its counterpart, quantum verification. It also includes two introductory tutorials, one on the fundamental relation between thermodynamics and information theory, and a primer on Shannon's entropy and information theory. The book offers a unique and manifold perspective on recent mathematical and physical developments in this field.
This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.
This is a critical, learned edition of the General Report on Tunny with Emphasis on Statistical Methods (aka The Newmanry Report), prepared in 1945 and declassified in 2000. The Report was a technical account of what the team of cryptanalysts did in their work at Bletchley Park during WWII. The editors of this edition have supervised its transcription into a carefully typeset edition that is both historically faithful to the original text and provides helpful footnotes, endnotes, essays, and glossaries that will assist historians, academics, and anyone interested in espionage and cryptography in interpreting the report.
This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures. This is an open access book.
This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management. *The conference was held virtually.
The four-volume set CCIS 1580, CCIS 1581, CCIS 1582, and CCIS 1583 contains the extended abstracts of the posters presented during the 24th International Conference on Human-Computer Interaction, HCII 2022, which was held virtually in June - July 2022. The total of 1276 papers and 275 posters included in the 40 HCII 2021 proceedings volumes was carefully reviewed and selected from 5583 submissions.The posters presented in these four volumes are organized in topical sections as follows: Part I: user experience design and evaluation; visual design and visualization; data, information and knowledge; interacting with AI; universal access, accessibility and design for aging. Part II: multimodal and natural interaction; perception, cognition, emotion and psychophysiological monitoring; human motion modelling and monitoring; IoT and intelligent living environments. Part III: learning technologies; HCI, cultural heritage and art; eGovernment and eBusiness; digital commerce and the customer experience; social media and the metaverse. Part IV: virtual and augmented reality; autonomous vehicles and urban mobility; product and robot design; HCI and wellbeing; HCI and cybersecurity.
The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.
This book constitutes the refereed proceedings of the 15th International Baltic Conference on Digital Business and Intelligent Systems, Baltic DB&IS 2022, held in Riga, Latvia, in July 2022. The 16 revised full papers and 1 short paper presented were carefully reviewed and selected from 42 submissions. The papers are centered around topics like architectures and quality of information systems, artificial intelligence in information systems, data and knowledge engineering, enterprise and information systems engineering, security of information systems.
This book constitutes the refereed proceedings of the 8th EAI International Conference on Industrial Networks and Intelligent Systems, INISCOM 2022, held in April 2022. Due to COVID-19 pandemic the conference was held virtually. The 19 full papers were selected from 48 submissions and are organized thematically in tracks on Telecommunications Systems and Networks; Information Processing and Data Analysis; Industrial Networks and Intelligent Systems; Security and Privacy.
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.
This two-volume set constitutes the refereed proceedings of the 8th International Conference on Human Aspects of IT for the Aged Population, ITAP 2022, held as part of the 24th International Conference, HCI International 2022, held as a virtual event, during June-July 2022. ITAP 2022 includes a total of 75 papers, which focus on topics related to designing for and with older users, technology acceptance and user experience of older users, use of social media and games by the aging population, as well as applications supporting health, wellbeing, communication, social participation and everyday activities. The papers are divided into the following topical sub-headings. Part I: Aging, Design and Gamification; Mobile, Wearable and Multimodal Interaction for Aging; Aging, Social Media and Digital Literacy; and Technology Acceptance and Adoption: Barriers and Facilitators for Older Adults Part II: Intelligent Environment for Daily Activities Support; Health and Wellbeing Technologies for the Elderly; and Aging, Communication and Social Interaction.
This book offers a structured algebraic and geometric approach to the classification and construction of quantum codes for topological quantum computation. It combines key concepts in linear algebra, algebraic topology, hyperbolic geometry, group theory, quantum mechanics, and classical and quantum coding theory to help readers understand and develop quantum codes for topological quantum computation. One possible approach to building a quantum computer is based on surface codes, operated as stabilizer codes. The surface codes evolved from Kitaev's toric codes, as a means to developing models for topological order by using qubits distributed on the surface of a toroid. A significant advantage of surface codes is their relative tolerance to local errors. A second approach is based on color codes, which are topological stabilizer codes defined on a tessellation with geometrically local stabilizer generators. This book provides basic geometric concepts, like surface geometry, hyperbolic geometry and tessellation, as well as basic algebraic concepts, like stabilizer formalism, for the construction of the most promising classes of quantum error-correcting codes such as surfaces codes and color codes. The book is intended for senior undergraduate and graduate students in Electrical Engineering and Mathematics with an understanding of the basic concepts of linear algebra and quantum mechanics.
This book constitutes the refereed proceedings of the 11th International Conference on Design, User Experience, and Usability, DUXU 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022.The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The DUXU 2022 proceedings comprise three volumes; they were organized in the following topical sections: Part I: Processes, Methods, and Tools for UX Design and Evaluation; User Requirements, Preferences, and UX Influential Factors; Usability, Acceptance, and User Experience Assessment. Part II: Emotion, Motivation, and Persuasion Design; Design for Well-being and Health.- Learning Experience Design; Globalization, Localization, and Culture Issues. Part III: Design Thinking and Philosophy; DUXU Case Studies; Design and User Experience in Emerging Technologies. |
You may like...
29th European Symposium on Computer…
Anton A Kiss, Edwin Zondervan, …
Hardcover
R11,317
Discovery Miles 113 170
Decision Analytics for Sustainable…
Vikram Bali, Vishal Bhatnagar, …
Hardcover
R4,279
Discovery Miles 42 790
Manufacturing Integrated Design - Sheet…
Peter Groche, Enrico Bruder, …
Hardcover
R4,107
Discovery Miles 41 070
Math for the Digital Factory
Luca Ghezzi, Dietmar Homberg, …
Hardcover
R4,111
Discovery Miles 41 110
Models, Algorithms, and Technologies for…
Boris I. Goldengorin, Valery A. Kalyagin, …
Hardcover
R4,027
Discovery Miles 40 270
Robust Optimization of Spline Models and…
Ayse OEzmen
Hardcover
Advances in Operational Research in the…
Nenad Mladenovic, Angelo Sifaleras, …
Hardcover
R4,042
Discovery Miles 40 420
Advanced Multiresponse Process…
Tatjana V. Sibalija, Vidosav D. Majstorovic
Hardcover
|