0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,631)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Emerging Trends in the Evolution of Service-Oriented and Enterprise Architectures (Hardcover, 1st ed. 2016): Eman El-Sheikh,... Emerging Trends in the Evolution of Service-Oriented and Enterprise Architectures (Hardcover, 1st ed. 2016)
Eman El-Sheikh, Alfred Zimmermann, Lakhmi C. Jain
R4,185 R3,384 Discovery Miles 33 840 Save R801 (19%) Ships in 10 - 15 working days

This book presents emerging trends in the evolution of service-oriented and enterprise architectures. New architectures and methods of both business and IT are integrating services to support mobility systems, Internet of Things, Ubiquitous Computing, collaborative and adaptive business processes, Big Data, and Cloud ecosystems. They inspire current and future digital strategies and create new opportunities for the digital transformation of next digital products and services. Services Oriented Architectures (SOA) and Enterprise Architectures (EA) have emerged as a useful framework for developing interoperable, large-scale systems, typically implementing various standards, like Web Services, REST, and Microservices. Managing the adaptation and evolution of such systems presents a great challenge. Service-Oriented Architecture enables flexibility through loose coupling, both between the services themselves and between the IT organizations that manage them. Enterprises evolve continuously by transforming and extending their services, processes and information systems. Enterprise Architectures provide a holistic blueprint to help define the structure and operation of an organization with the goal of determining how an organization can most effectively achieve its objectives. The book proposes several approaches to address the challenges of the service-oriented evolution of digital enterprise and software architectures.

Fiber Network Service Survivability (Hardcover): Tsong-Ho Wu Fiber Network Service Survivability (Hardcover)
Tsong-Ho Wu
R3,169 Discovery Miles 31 690 Ships in 18 - 22 working days

This book examines the architectures, technologies, and design methods that make it possible to achieve a survivable fiber network, both practically and economically. Combining theory and actual results, it explores alternative methods and presents analytical and computational optimization approaches.

Computational Aspects and Applications in Large-Scale Networks - NET 2017, Nizhny Novgorod, Russia, June 2017 (Hardcover, 1st... Computational Aspects and Applications in Large-Scale Networks - NET 2017, Nizhny Novgorod, Russia, June 2017 (Hardcover, 1st ed. 2018)
Valery A. Kalyagin, Panos M. Pardalos, Oleg Prokopyev, Irina Utkina
R2,702 Discovery Miles 27 020 Ships in 18 - 22 working days

Contributions in this volume focus on computationally efficient algorithms and rigorous mathematical theories for analyzing large-scale networks. Researchers and students in mathematics, economics, statistics, computer science and engineering will find this collection a valuable resource filled with the latest research in network analysis. Computational aspects and applications of large-scale networks in market models, neural networks, social networks, power transmission grids, maximum clique problem, telecommunication networks, and complexity graphs are included with new tools for efficient network analysis of large-scale networks. This proceeding is a result of the 7th International Conference in Network Analysis, held at the Higher School of Economics, Nizhny Novgorod in June 2017. The conference brought together scientists, engineers, and researchers from academia, industry, and government.

Grids, P2P and Services Computing (Hardcover, 2010 ed.): Frederic Desprez, Vladimir Getov, Thierry Priol, Ramin Yahyapour Grids, P2P and Services Computing (Hardcover, 2010 ed.)
Frederic Desprez, Vladimir Getov, Thierry Priol, Ramin Yahyapour
R4,121 Discovery Miles 41 210 Ships in 18 - 22 working days

Grids, P2P and Services Computing, the 12th volume of the CoreGRID series, is based on the CoreGrid ERCIM Working Group Workshop on Grids, P2P and Service Computing in Conjunction with EuroPar 2009. The workshop will take place August 24th, 2009 in Delft, The Netherlands. Grids, P2P and Services Computing, an edited volume contributed by well-established researchers worldwide, will focus on solving research challenges for Grid and P2P technologies. Topics of interest include: Service Level Agreement, Data & Knowledge Management, Scheduling, Trust and Security, Network Monitoring and more. Grids are a crucial enabling technology for scientific and industrial development. This book also includes new challenges related to service-oriented infrastructures. Grids, P2P and Services Computing is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.

Infectious Disease Informatics and Biosurveillance (Hardcover, 2011 Ed.): Daniel Zeng, Hsinchun Chen, Carlos Castillo-Chavez,... Infectious Disease Informatics and Biosurveillance (Hardcover, 2011 Ed.)
Daniel Zeng, Hsinchun Chen, Carlos Castillo-Chavez, William B. Lober, Mark Thurmond
R5,434 Discovery Miles 54 340 Ships in 18 - 22 working days

This book on Infectious Disease Informatics (IDI) and biosurveillance is intended to provide an integrated view of the current state of the art, identify technical and policy challenges and opportunities, and promote cross-disciplinary research that takes advantage of novel methodology and what we have learned from innovative applications. This book also fills a systemic gap in the literature by emphasizing informatics driven perspectives (e.g., information system design, data standards, computational aspects of biosurveillance algorithms, and system evaluation). Finally, this book attempts to reach policy makers and practitioners through the clear and effective communication of recent research findings in the context of case studies in IDI and biosurveillance, providing "hands-on" in-depth opportunities to practitioners to increase their understanding of value, applicability, and limitations of technical solutions. This book collects the state of the art research and modern perspectives of distinguished individuals and research groups on cutting-edge IDI technical and policy research and its application in biosurveillance. The contributed chapters are grouped into three units. Unit I provides an overview of recent biosurveillance research while highlighting the relevant legal and policy structures in the context of IDI and biosurveillance ongoing activities. It also identifies IDI data sources while addressing information collection, sharing, and dissemination issues as well as ethical considerations. Unit II contains survey chapters on the types of surveillance methods used to analyze IDI data in the context of public health and bioterrorism. Specific computational techniques covered include: text mining, time series analysis, multiple data streams methods, ensembles of surveillance methods, spatial analysis and visualization, social network analysis, and agent-based simulation. Unit III examines IT and decision support for public health event response and bio-defense. Practical lessons learned in developing public health and biosurveillance systems, technology adoption, and syndromic surveillance for large events are discussed. The goal of this book is to provide an understandable interdisciplinary IDI and biosurveillance reference either used as a standalone textbook or reference for students, researchers, and practitioners in public health, veterinary medicine, biostatistics, information systems, computer science, and public administration and policy.

Frames and Connections in the Governance of Global Communications - A Network Study of the Internet Governance Forum... Frames and Connections in the Governance of Global Communications - A Network Study of the Internet Governance Forum (Hardcover)
Elena Pavan
R3,069 Discovery Miles 30 690 Ships in 18 - 22 working days

The governance of global communications is consolidating as a field where innovative political practices of multi-actor collaboration are being experimented. Within this broad political landscape, the Internet governance domain is emerging as one of the most relevant areas where institutional and non-institutional actors are converging in order to reform collectively governance mechanisms that will determine the future developments of the Internet technology. This book adopts a network approach to study the progressive and collective construction of a new discourse on Internet governance fostered by the realization of the United Nations Internet Governance Forum, a new "space for multi-stakeholder policy-dialogue" (WSIS Tunis Agenda 2005, art. 72). Looking both at how semantic and social connections are created in the online and the offline discursive spaces, this book seeks to provide insights on how principles of democratic collaboration between institutional and non-institutional actors are translated into actual political dynamics; on how the global political agenda on the governance of the Internet comes to be shaped thanks to the provision of heterogeneous and sometimes opposite thematic inputs; and, finally, on how the roles of States, intergovernmental bodies, civil society entities in participatory supra-national politics are progressively being (re)defined. Starting form the Internet governance case study, this books aims at providing an alternative approach to the study of supra-national politics as well as of global communication governance processes: one that considers simultaneously contents and processes of political dynamics and examines how immaterial resources, such as information and communication, become a new field for multi-actor politics experiments, conflicts and network construction.

Critical Research on Scalability and Security Issues in Virtual Cloud Environments (Hardcover): Shadi Aljawarneh, Manisha... Critical Research on Scalability and Security Issues in Virtual Cloud Environments (Hardcover)
Shadi Aljawarneh, Manisha Malhotra
R5,555 Discovery Miles 55 550 Ships in 18 - 22 working days

Individual users and business organizations are shifting their data storage and utilizing cloud computing because of its easy availability and reduced costs. Although, this technology is creating an easy way to store, share, and access data, serious security concerns have been generated. Critical Research on Scalability and Security Issues in Virtual Cloud Environments is a critical scholarly resource that examines the concept of cloud computing and explores the various shortcomings of using the cloud. Featuring coverage on a broad range of topics such as cloud architecture for scalability, data vulnerability, and server virtualization management, this book is geared towards academicians, practitioners, and researchers seeking current research on developing effective security measures for cloud paradigm.

Cyber Attacks - Protecting National Infrastructure (Hardcover): Edward Amoroso Cyber Attacks - Protecting National Infrastructure (Hardcover)
Edward Amoroso
R1,212 Discovery Miles 12 120 Ships in 10 - 15 working days

No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction.

* Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.

Economics of Information Security and Privacy III (Hardcover, 2012): Bruce Schneier Economics of Information Security and Privacy III (Hardcover, 2012)
Bruce Schneier
R4,688 Discovery Miles 46 880 Ships in 10 - 15 working days

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. "Economics of Information Security and Privacy III" addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?

Chipless RFID - Design Procedure and Detection Techniques (Hardcover, 2015 ed.): Reza Rezaiesarlak, Majid Manteghi Chipless RFID - Design Procedure and Detection Techniques (Hardcover, 2015 ed.)
Reza Rezaiesarlak, Majid Manteghi
R3,812 R3,282 Discovery Miles 32 820 Save R530 (14%) Ships in 10 - 15 working days

This book examines the design of chipless RFID systems. The authors begin with the philosophy of RFID and its effect on commercial applications. Then, they discuss the chipless RFID systems and the application of chipless RFID systems, the advantages it provides compared to conventional barcode ID and chipped RFID tags. The text then covers chipless RFID components in block diagram representation and introduce FCC requirements which should be considered in the design procedure of each component. The third chapter is dedicated to the complex natural resonance-based design of chipless RFID tags. The next chapter concerns about the detection techniques introduced for the identification of chipless RFID tags. The fifth chapter is dedicated to the localization and anti-collision techniques in chipless RFID systems. Final chapter is chipless RFID tags as sensors. It provides some applications where the tag can be used as both ID and sensor. The tag specifications and detection issues are addressed in this section.

Social Customer Relationship Management - Fundamentals, Applications, Technologies (Hardcover, 1st ed. 2020): Rainer Alt, Olaf... Social Customer Relationship Management - Fundamentals, Applications, Technologies (Hardcover, 1st ed. 2020)
Rainer Alt, Olaf Reinhold
R1,747 Discovery Miles 17 470 Ships in 18 - 22 working days

Social media has received considerable attention, and many potential benefits, as well as concerns, are now being discussed. This book explores how social media can successfully support business processes in marketing, sales and service in the context of customer relationship management (CRM). It presents the fundamentals of Social CRM and shows how small and large companies alike have implemented it. In turn, the book presents analytic and operational software tools that offer features for enhancing and streamlining interactions with customers. The book concludes with an overview of essential design areas that businesses need to bear in mind when introducing social media into their CRM strategies. In this regard, it also points out key success factors, limitations, and data protection aspects.

Topology Control in Wireless Ad Hoc and Sensor Networks (Hardcover): P Santi Topology Control in Wireless Ad Hoc and Sensor Networks (Hardcover)
P Santi
R2,806 Discovery Miles 28 060 Ships in 18 - 22 working days

Topology control is fundamental to solving scalability and capacity problems in large-scale wireless ad hoc and sensor networks.

Forthcoming wireless multi-hop networks such as ad hoc and sensor networks will allow network nodes to control the communication topology by choosing their transmitting ranges. Briefly, "topology control" (TC) is the art of co-ordinating nodes' decisions regarding their transmitting ranges, to generate a network with the desired features. Building an optimized network topology helps surpass the prevalent scalability and capacity problems.

"Topology Control in Wireless Ad Hoc and Sensor Networks" makes the case for topology control and provides an exhaustive coverage of TC techniques in wireless ad hoc and sensor networks, considering both stationary networks, to which most of the existing solutions are tailored, and mobile networks. The author introduces a new taxonomy of topology control and gives a full explication of the applications and challenges of this important topic.

"Topology Control in Wireless Ad Hoc and Sensor Networks: " Defines topology control and explains its necessity, considering both stationary and mobile networks. Describes the most representative TC protocols and their performance. Covers the critical transmitting range for stationary and mobile networks, topology optimization problems such as energy efficiency, and distributed topology control. Discusses implementation and 'open issues', including realistic models and the effect of multi-hop data traffic. Presents a case study on routing protocol design, to demonstrate how TC can ease the design of cooperative routing protocols.

This invaluable text will provide graduatestudents in Computer Science, Electrical and Computer Engineering, Applied Mathematics and Physics, researchers in the field of ad hoc networking, and professionals in wireless telecoms as well as networking system developers with a single reference resource on topology control.

Computational Intelligence for Traffic and Mobility (Hardcover, 2013 ed.): Wuhong Wang, Geert Wets Computational Intelligence for Traffic and Mobility (Hardcover, 2013 ed.)
Wuhong Wang, Geert Wets
R3,177 R2,006 Discovery Miles 20 060 Save R1,171 (37%) Ships in 10 - 15 working days

This book presents the new development of computation intelligence for traffic, transportation and mobility, the main contents include traffic safety, mobility analysis, intelligent transportation system, smart vehicle, transportation behavior, driver modeling and assistance, transportation risk analysis and reliability system analysis, vehicle operation and active safety, urban traffic management and planning.

Interconnecting Smart Objects with IP - The Next Internet (Paperback): Jean-Philippe Vasseur, Adam Dunkels Interconnecting Smart Objects with IP - The Next Internet (Paperback)
Jean-Philippe Vasseur, Adam Dunkels
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

Smart object technology, sometimes called the Internet of Things, is having a profound impact on our day-to-day lives. "Interconnecting Smart Objects with IP" is the first book that takes a holistic approach to the revolutionary area of IP-based smart objects. Smart objects are the intersection of networked embedded systems, wireless sensor networks, ubiquitous and pervasive computing, mobile telephony and telemetry, and mobile computer networking. This book consists of three parts, Part I focuses on the architecture of smart objects networking, Part II covers the hardware, software, and protocols for smart objects, and Part III provides case studies on how and where smart objects are being used today and in the future. The book covers the fundamentals of IP communication for smart objects, IPv6, and web services, as well as several newly specified low-power IP standards such as the IETF 6LoWPAN adaptation layer and the RPL routing protocol. This book contains essential information not only for the technical reader but also for policy makers and decision makers in the area of smart objects both for private IP networks and the Internet.
Shows in detail how connecting smart objects impacts our lives with practical implementation examples and case studies Provides an in depth understanding of the technological and architectural aspects underlying smart objects technology Offers an in-depth examination of relevant IP protocols to build large scale smart object networks in support of a myriad of new services

Predictive Maintenance in Dynamic Systems - Advanced Methods, Decision Support Tools and Real-World Applications (Hardcover,... Predictive Maintenance in Dynamic Systems - Advanced Methods, Decision Support Tools and Real-World Applications (Hardcover, 1st ed. 2019)
Edwin Lughofer, Moamar Sayed-Mouchaweh
R4,343 Discovery Miles 43 430 Ships in 18 - 22 working days

This book provides a complete picture of several decision support tools for predictive maintenance. These include embedding early anomaly/fault detection, diagnosis and reasoning, remaining useful life prediction (fault prognostics), quality prediction and self-reaction, as well as optimization, control and self-healing techniques. It shows recent applications of these techniques within various types of industrial (production/utilities/equipment/plants/smart devices, etc.) systems addressing several challenges in Industry 4.0 and different tasks dealing with Big Data Streams, Internet of Things, specific infrastructures and tools, high system dynamics and non-stationary environments . Applications discussed include production and manufacturing systems, renewable energy production and management, maritime systems, power plants and turbines, conditioning systems, compressor valves, induction motors, flight simulators, railway infrastructures, mobile robots, cyber security and Internet of Things. The contributors go beyond state of the art by placing a specific focus on dynamic systems, where it is of utmost importance to update system and maintenance models on the fly to maintain their predictive power.

Amazon Redshift Database Developer Guide (Hardcover): Documentation Team Amazon Redshift Database Developer Guide (Hardcover)
Documentation Team
R2,960 Discovery Miles 29 600 Ships in 18 - 22 working days
Advances in Neural Networks: Computational and Theoretical Issues (Hardcover, 2015 ed.): Simone Bassis, Anna Esposito,... Advances in Neural Networks: Computational and Theoretical Issues (Hardcover, 2015 ed.)
Simone Bassis, Anna Esposito, Francesco Carlo Morabito
R2,744 Discovery Miles 27 440 Ships in 18 - 22 working days

This book collects research works that exploit neural networks and machine learning techniques from a multidisciplinary perspective. Subjects covered include theoretical, methodological and computational topics which are grouped together into chapters devoted to the discussion of novelties and innovations related to the field of Artificial Neural Networks as well as the use of neural networks for applications, pattern recognition, signal processing, and special topics such as the detection and recognition of multimodal emotional expressions and daily cognitive functions, and bio-inspired memristor-based networks. Providing insights into the latest research interest from a pool of international experts coming from different research fields, the volume becomes valuable to all those with any interest in a holistic approach to implement believable, autonomous, adaptive and context-aware Information Communication Technologies.

Handbook of Distributed Sensor Networks: Volume II (Hardcover): Marvin Heather Handbook of Distributed Sensor Networks: Volume II (Hardcover)
Marvin Heather
R3,163 R2,865 Discovery Miles 28 650 Save R298 (9%) Ships in 18 - 22 working days
Handbook of Computer Networks and Communications: Volume II (Hardcover): Akira Hanako Handbook of Computer Networks and Communications: Volume II (Hardcover)
Akira Hanako
R3,164 R2,866 Discovery Miles 28 660 Save R298 (9%) Ships in 18 - 22 working days
Microsoft Virtualization - Master Microsoft Server, Desktop, Application, and Presentation Virtualization (Paperback): Thomas... Microsoft Virtualization - Master Microsoft Server, Desktop, Application, and Presentation Virtualization (Paperback)
Thomas Olzak, James Sabovik, Jason Boomer, Robert M. Keefer
R804 Discovery Miles 8 040 Ships in 10 - 15 working days

Virtualization technologies help IT organizations in three ways: cost-cutting, ease of administration, and the overall effect of IT on the environment. Virtualization cuts costs by reducing the amount of capital resources (equipment), power, and cooling to run an IT infrastructure. Because of the tools that are involved in virtualization, it also reduces the burden of IT management significantly. Finally, by reducing the amount of cooling, power, and other emissions from these servers, virtualization can help IT organizations become more "green."
Microsoft growth is up from 2006, when it held an 8% market share to 23%. When this report was released, Hyper-V had just started shipping, and is expected to make substantial market gain for Microsoft. A poor economy will actually help the growth of virtualization. Virtualization will gain IT dollars at the expense of other technologies for one reason: cost. Technologies that require high up-front expenditures but take time to generate ROI will be put on hold, while technologies like virtualization that promise immediate cost savings will enjoy broader adoption. Currenty, only 7% to 8% of servers are virtualized (worldwide) with many IT executives researching or planning to implement in the next 18 to 24 months.
Covers Microsoft virtualization products completely, including Hyper-V Includes a special section on securing virtual infrastructure Gives hands-on instructions to help understand and implement Microsoft solutions

Transferring Information Literacy Practices (Hardcover, 1st ed. 2019): Billy Tak Hoi Leung, Jingzhen Xie, Linlin Geng,... Transferring Information Literacy Practices (Hardcover, 1st ed. 2019)
Billy Tak Hoi Leung, Jingzhen Xie, Linlin Geng, Priscilla Nga Ian Pun
R3,116 Discovery Miles 31 160 Ships in 18 - 22 working days

This book focuses on information literacy for the younger generation of learners and library readers. It is divided into four sections: 1. Information Literacy for Life; 2. Searching Strategies, Disciplines and Special Topics; 3. Information Literacy Tools for Evaluating and Utilizing Resources; 4. Assessment of Learning Outcomes. Written by librarians with wide experience in research and services, and a strong academic background in disciplines such as the humanities, social sciences, information technology, and library science, this valuable reference resource combines both theory and practice. In today's ever-changing era of information, it offers students of library and information studies insights into information literacy as well as learning tips they can use for life.

Implementing EDI (Hardcover): Mike Hendry Implementing EDI (Hardcover)
Mike Hendry
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

This superb introduction examines all aspects of implementation from concept to reality, and spells out the pros, cons, and effects of EDI in your organization. The cost of EDI hardware, software, training, transmission, and maintenance are broken down and clearly explained to prevent problems and maximize benefits. Checklists and procedural guidelines are also offered to ease your EDI transition -- so that you're never left with a system you can't put online quickly and efficiently.

Autonomous Control for a Reliable Internet of Services - Methods, Models, Approaches, Techniques, Algorithms, and Tools... Autonomous Control for a Reliable Internet of Services - Methods, Models, Approaches, Techniques, Algorithms, and Tools (Hardcover)
Ivan Ganchev, R. D. van der Mei, Hans van den Berg
R1,633 Discovery Miles 16 330 Ships in 18 - 22 working days
Look-Ahead Based Sigma-Delta Modulation (Hardcover, 2011 Ed.): Erwin Janssen, Arthur Van Roermund Look-Ahead Based Sigma-Delta Modulation (Hardcover, 2011 Ed.)
Erwin Janssen, Arthur Van Roermund
R4,034 Discovery Miles 40 340 Ships in 18 - 22 working days

The aim of this book is to expand and improve upon the existing knowledge on discrete-time 1-bit look-ahead sigma-delta modulation in general, and to come to a solution for the above mentioned specific issues arising from 1-bit sigma-delta modulation for SA-CD. In order to achieve this objective an analysis is made of the possibilities for improving the performance of digital noise-shaping look-ahead solutions. On the basis of the insights obtained from the analysis, several novel generic 1-bit look-ahead solutions that improve upon the state-of-the-art will be derived and their performance will be evaluated and compared. Finally, all the insights are combined with the knowledge of the SA-CD lossless data compression algorithm to come to a specifically for SA-CD optimized look-ahead design.

IT Convergence and Security 2017 - Volume 1 (Hardcover, 1st ed. 2018): Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek IT Convergence and Security 2017 - Volume 1 (Hardcover, 1st ed. 2018)
Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek
R6,061 Discovery Miles 60 610 Ships in 18 - 22 working days

This is the first volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in this field. It explores how IT convergence and security issues are core to most current research, and industrial and commercial activities. It consists of contributions covering topics such as machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics. ICITCS 2017 is the latest in a series of highly successful International Conferences on IT Convergence and Security, previously held in Prague, Czech Republic(2016), Kuala Lumpur, Malaysia (2015) Beijing, China (2014), Macau, China (2013), Pyeong Chang, Korea (2012), and Suwon, Korea (2011).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Vicarious Sacrifice - Grounded in…
Horace Bushnell Paperback R679 Discovery Miles 6 790
Engineering Scalable, Elastic, and…
Steffen Becker, Gunnar Brataas, … Hardcover R2,017 Discovery Miles 20 170
Dare to Be More - The Witness of Blessed…
Colleen Swaim, Matt Swaim Paperback R177 R164 Discovery Miles 1 640
The Problem of Christianity - the…
Josiah Royce Paperback R641 Discovery Miles 6 410
The Analogy of Religion - Natural and…
Joseph Butler Paperback R570 Discovery Miles 5 700
Thoughts of Blaise Pascal
Blaise Pascal Paperback R575 Discovery Miles 5 750
Artificial Intelligence in Theory and…
Max Bramer Hardcover R1,429 Discovery Miles 14 290
Fault Tolerant Architectures for…
Sikhar Patranabis, Debdeep Mukhopadhyay Hardcover R3,802 Discovery Miles 38 020
Wireless Sensor Networks - Security…
Rastko R. Selmic, Vir V Phoha, … Hardcover R2,522 Discovery Miles 25 220
Safety Message Broadcast in Vehicular…
Yuanguo Bi, Haibo Zhou, … Hardcover R2,653 Discovery Miles 26 530

 

Partners