0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (5)
  • R250 - R500 (51)
  • R500+ (5,315)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013,... Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013, Proceedings (Paperback, 2013 ed.)
Sajal K. Das, Cristina Nita-Rotaru, Murat Kantarcioglu
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for Security, GameSec 2013, held in Fort Worth, TX, USA, in November 2013. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. The conference focuses on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. At the same time, the connection between theoretical models and real world security problems are emphasized to establish the important feedback loop between theory and practice. Observing the scarcity of venues for researchers who try to develop a deeper theoretical understanding of the underlying incentive and resource allocation issues in security, we believe that GameSec will fill an important void and serve as a distinguished forum of highest standards for years to come.

Euro-Par 2014: Parallel Processing Workshops - Euro-Par 2014 International Workshops, Porto, Portugal, August 25-26, 2014,... Euro-Par 2014: Parallel Processing Workshops - Euro-Par 2014 International Workshops, Porto, Portugal, August 25-26, 2014, Revised Selected Papers, Part II (Paperback, 2014 ed.)
Luis Lopes, Julius Zilinskas, Alexandru Costan, Roberto G Cascella, Gabor Kecskemeti, …
R1,509 Discovery Miles 15 090 Ships in 18 - 22 working days

The two volumes LNCS 8805 and 8806 constitute the thoroughly refereed post-conference proceedings of 18 workshops held at the 20th International Conference on Parallel Computing, Euro-Par 2014, in Porto, Portugal, in August 2014. The 100 revised full papers presented were carefully reviewed and selected from 173 submissions. The volumes include papers from the following workshops: APCI&E (First Workshop on Applications of Parallel Computation in Industry and Engineering - BigDataCloud (Third Workshop on Big Data Management in Clouds) - DIHC (Second Workshop on Dependability and Interoperability in Heterogeneous Clouds) - FedICI (Second Workshop on Federative and Interoperable Cloud Infrastructures) - Hetero Par (12th International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms) - HiBB (5th Workshop on High Performance Bioinformatics and Biomedicine) - LSDVE (Second Workshop on Large Scale Distributed Virtual Environments on Clouds and P2P) - MuCoCoS (7th International Workshop on Multi-/Many-core Computing Systems) - OMHI (Third Workshop on On-chip Memory Hierarchies and Interconnects) - PADAPS (Second Workshop on Parallel and Distributed Agent-Based Simulations) - PROPER (7th Workshop on Productivity and Performance) - Resilience (7th Workshop on Resiliency in High Performance Computing with Clusters, Clouds, and Grids) - REPPAR (First International Workshop on Reproducibility in Parallel Computing) - ROME (Second Workshop on Runtime and Operating Systems for the Many Core Era) - SPPEXA (Workshop on Software for Exascale Computing) - TASUS (First Workshop on Techniques and Applications for Sustainable Ultrascale Computing Systems) - UCHPC (7th Workshop on Un Conventional High Performance Computing) and VHPC (9th Workshop on Virtualization in High-Performance Cloud Computing.

Practical Analysis of Algorithms (Paperback, 2014 ed.): Dana Vrajitoru, William Knight Practical Analysis of Algorithms (Paperback, 2014 ed.)
Dana Vrajitoru, William Knight
R1,570 Discovery Miles 15 700 Ships in 18 - 22 working days

This book introduces the essential concepts of algorithm analysis required by core undergraduate and graduate computer science courses, in addition to providing a review of the fundamental mathematical notions necessary to understand these concepts. Features: includes numerous fully-worked examples and step-by-step proofs, assuming no strong mathematical background; describes the foundation of the analysis of algorithms theory in terms of the big-Oh, Omega, and Theta notations; examines recurrence relations; discusses the concepts of basic operation, traditional loop counting, and best case and worst case complexities; reviews various algorithms of a probabilistic nature, and uses elements of probability theory to compute the average complexity of algorithms such as Quicksort; introduces a variety of classical finite graph algorithms, together with an analysis of their complexity; provides an appendix on probability theory, reviewing the major definitions and theorems used in the book.

Fuzzy Database Modeling (Paperback, Softcover reprint of the original 1st ed. 1999): Adnan Yazici, Roy George Fuzzy Database Modeling (Paperback, Softcover reprint of the original 1st ed. 1999)
Adnan Yazici, Roy George
R2,641 Discovery Miles 26 410 Ships in 18 - 22 working days

Some recent fuzzy database modeling advances for the non-traditional applications are introduced in this book. The focus is on database models for modeling complex information and uncertainty at the conceptual, logical, physical design levels and from integrity constraints defined on the fuzzy relations.
The database models addressed here are; the conceptual data models, including the ExIFO and ExIFO2 data models, the logical database models, including the extended NF2 database model, fuzzy object-oriented database model, and the fuzzy deductive object-oriented database model. Integrity constraints are defined on the fuzzy relations are also addressed. A continuing reason for the limited adoption of fuzzy database systems has been performance. There have been few efforts at defining physical structures that accomodate fuzzy information. A new access structure and data organization for fuzzy information is introduced in this book.

Structural, Syntactic, and Statistical Pattern Recognition - Joint IAPR International Workshop, S+SSPR 2014, Joensuu, Finland,... Structural, Syntactic, and Statistical Pattern Recognition - Joint IAPR International Workshop, S+SSPR 2014, Joensuu, Finland, August 20-22, 2014, Proceedings (Paperback, 2014 ed.)
Pasi Franti, Gavin Brown, Marco Loog, Francisco Escolano, Marcello Pelillo
R2,682 Discovery Miles 26 820 Ships in 18 - 22 working days

This book constitutes the proceedings of the Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition, S+SSPR 2014; comprising the International Workshop on Structural and Syntactic Pattern Recognition, SSPR, and the International Workshop on Statistical Techniques in Pattern Recognition, SPR. The total of 25 full papers and 22 poster papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections named: graph kernels; clustering; graph edit distance; graph models and embedding; discriminant analysis; combining and selecting; joint session; metrics and dissimilarities; applications; partial supervision; and poster session.

Guide to FPGA Implementation of Arithmetic Functions (Paperback, 2012 ed.): Jean-Pierre Deschamps, Gustavo D. Sutter, Enrique... Guide to FPGA Implementation of Arithmetic Functions (Paperback, 2012 ed.)
Jean-Pierre Deschamps, Gustavo D. Sutter, Enrique Canto
R5,875 Discovery Miles 58 750 Ships in 18 - 22 working days

This book is designed both for FPGA users interested in developing new, specific components - generally for reducing execution times -and IP core designers interested in extending their catalog of specific components. The main focus is circuit synthesis and the discussion shows, for example, how a given algorithm executing some complex function can be translated to a synthesizable circuit description, as well as which are the best choices the designer can make to reduce the circuit cost, latency, or power consumption. This is not a book on algorithms. It is a book that shows how to translate efficiently an algorithm to a circuit, using techniques such as parallelism, pipeline, loop unrolling, and others. Numerous examples of FPGA implementation are described throughout this book and the circuits are modeled in VHDL. Complete and synthesizable source files are available for download."

Theory and Practice of Natural Computing - Third International Conference, TPNC 2014, Granada, Spain, December 9-11, 2014.... Theory and Practice of Natural Computing - Third International Conference, TPNC 2014, Granada, Spain, December 9-11, 2014. Proceedings (Paperback, 2014 ed.)
Adrian Horia Dediu, Manuel Lozano, Carlos Martin-Vide
R2,100 Discovery Miles 21 000 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference, TPNC 2014, held in Granada, Spain, in December 2014. The 22 revised full papers presented in this book were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on nature-inspired models of computation; synthesizing nature by means of computation; nature-inspired materials; and information processing in nature.

Computational Logistics - 4th International Conference, ICCL 2013, Copenhagen, Denmark, September 25-27, 2013, Proceedings... Computational Logistics - 4th International Conference, ICCL 2013, Copenhagen, Denmark, September 25-27, 2013, Proceedings (Paperback, 2013 ed.)
Dario Pacino, Stefan Voss, Rune Moller Jensen
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Conference on Computational Logistics, ICCL 2013, held in Copenhagen, Denmark, in September 2013. The 19 papers presented in this volume were carefully reviewed and selected for inclusion in the book. They are organized in topical sections named: maritime shipping, road transport, vehicle routing problems, aviation applications, and logistics and supply chain management.

Similarity Search and Applications - 6th International Conference, SISAP 2013, A Coruna, Spain, October 2-4, 2013, Proceedings... Similarity Search and Applications - 6th International Conference, SISAP 2013, A Coruna, Spain, October 2-4, 2013, Proceedings (Paperback, 2013 ed.)
Nieves Brisaboa, Oscar Pedreira, Pavel Zezula
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Similarity Search and Applications, SISAP 2013, held in A Coruna, Spain, in October 2013. The 19 full papers, 6 short papers and 2 demo papers, presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on new scenarios and approaches; improving similarity search methods and techniques; metrics and evaluation; applications and specific domains; and implementation and engineering solutions."

Discovery Science - 16th International Conference, DS 2013, Singapore, October 6-9, 2013, Proceedings (Paperback, 2013 ed.):... Discovery Science - 16th International Conference, DS 2013, Singapore, October 6-9, 2013, Proceedings (Paperback, 2013 ed.)
Johannes Furnkranz, Eyke Hullermeier, Tomoyuki Higuchi
R1,430 Discovery Miles 14 300 Ships in 18 - 22 working days

This book constitutes the proceedings of the 16th International Conference on Discovery Science, DS 2013, held in Singapore in October 2013, and co-located with the International Conference on Algorithmic Learning Theory, ALT 2013. The 23 papers presented in this volume were carefully reviewed and selected from 52 submissions. They cover recent advances in the development and analysis of methods of automatic scientific knowledge discovery, machine learning, intelligent data analysis, and their application to knowledge discovery.

Advances in Visual Informatics - Third International Visual Informatics Conference, IVIC 2013, Selangor, Malaysia, November... Advances in Visual Informatics - Third International Visual Informatics Conference, IVIC 2013, Selangor, Malaysia, November 13-15, 2013, Proceedings (Paperback, 2013 ed.)
Halimah Badioze Zaman, Peter Robinson, Patrick Olivier, Timothy K. Shih, Sergio Velastin
R2,794 Discovery Miles 27 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Advances in Visual Informatics, IVIC 2013, held in Selangor, Malaysia, in November 2013. The four keynotes and 69 papers presented were carefully reviewed and selected from various submissions. The papers focus on four tracks: computer visions and engineering; computer graphics and simulation; virtual and augmented reality; and visualization and social computing.

Formal Methods and Software Engineering - 15th International Conference on Formal EngineeringMethods, ICFEM 2013, Queenstown,... Formal Methods and Software Engineering - 15th International Conference on Formal EngineeringMethods, ICFEM 2013, Queenstown, New Zealand, October 29 - November 1, 2013, Proceedings (Paperback, 2013 ed.)
Lindsay Groves, Jing Sun
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Conference on Formal Engineering Methods, ICFEM 2013, held in Queenstown, New Zealand, in October/November 2013. The 28 revised full papers together with 2 keynote speeches presented were carefully reviewed and selected from 88 submissions. The topics covered are abstraction and refinement, formal specification and modeling, program analysis, software verification, formal methods for software safety, security, reliability and dependability, tool development, integration and experiments involving verified systems, formal methods used in certifying products under international standards, and formal model-based development and code generation.

Embedded Firmware Solutions - Development Best Practices for the Internet of Things (Paperback, 1st ed.): Vincent Zimmer,... Embedded Firmware Solutions - Development Best Practices for the Internet of Things (Paperback, 1st ed.)
Vincent Zimmer, Jiming Sun, Marc Jones, Stefan Reinauer
R1,051 Discovery Miles 10 510 Ships in 18 - 22 working days

Embedded Firmware Solutions is the perfect introduction and daily-use field guide--for the thousands of firmware designers, hardware engineers, architects, managers, and developers--to Intel's new firmware direction (including Quark coverage), showing how to integrate Intel (R) Architecture designs into their plans. Featuring hands-on examples and exercises using Open Source codebases, like Coreboot and EFI Development Kit (tianocore) and Chromebook, this is the first book that combines a timely and thorough overview of firmware solutions for the rapidly evolving embedded ecosystem with in-depth coverage of requirements and optimization.

Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.): Xinxin Liu, Xiaolin Li Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.)
Xinxin Liu, Xiaolin Li
R1,592 Discovery Miles 15 920 Ships in 18 - 22 working days

This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.

Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013,... Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings (Paperback, 2013 ed.)
Sihan Qing, Jianying Zhou, Dongmei Liu
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications.

Distributed Computing and Internet Technology - 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8,... Distributed Computing and Internet Technology - 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings (Paperback, 2015 ed.)
Raja Natarajan, Gautam Barua, Manas Ranjan Patra
R2,629 Discovery Miles 26 290 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Internet Technology, ICDCIT 2015, held in Bhubaneswar, India, in February 2015. The 12 revised full papers presented together with 30 short papers and 9 invited talks in this volume were carefully reviewed and selected from 221 submissions. The papers cover topics such as distributed computing and algorithms; internet technologies and Web services; secure computing and communication; cloud computing; information retrieval and recommender systems and societal applications.

Algorithms and Discrete Applied Mathematics - First International Conference, CALDAM  2015, Kanpur, India, February 8-10, 2015.... Algorithms and Discrete Applied Mathematics - First International Conference, CALDAM 2015, Kanpur, India, February 8-10, 2015. Proceedings (Paperback, 2015 ed.)
Sumit Ganguly, Ramesh Krishnamurti
R2,195 Discovery Miles 21 950 Ships in 18 - 22 working days

This book collects the refereed proceedings of the First International Conference onon Algorithms and Discrete Applied Mathematics, CALDAM 2015, held in Kanpur, India, in February 2015. The volume contains 26 full revised papers from 58 submissions along with 2 invited talks presented at the conference. The workshop covered a diverse range of topics on algorithms and discrete mathematics, including computational geometry, algorithms including approximation algorithms, graph theory and computational complexity.

Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September... Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013, Proceedings (Paperback, 2013 ed.)
Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Li Da Xu
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.

Evolution of Telecommunication Services - The Convergence of Telecom and Internet: Technologies and Ecosystems (Paperback, 2013... Evolution of Telecommunication Services - The Convergence of Telecom and Internet: Technologies and Ecosystems (Paperback, 2013 ed.)
Emmanuel Bertin, Noel Crespi, Thomas Magedanz
R2,259 Discovery Miles 22 590 Ships in 18 - 22 working days

In the telecom world, services have usually been conceived with a specific mindset. This mindset has defined the traditional characteristics of these services; services distinguished by their linkage with the access network, tight control over service use (e.g., authentication, billing), lack of deep personalization capabilities (mass services only) and reliance on standardization to achieve end-to-end interoperability between all the actors of the value chain (e.g., operators, platform manufacturers, device manufactures). This book offers insights into this complex but exciting world of telecommunications characterized by constant evolution, and approaches it from technology as well as business perspectives. The book is appropriately structured in three parts: (a) an overview of the state-of-the-art in fixed/mobile NGN and standardization activities; (b) an analysis of the competitive landscape between operators, device manufactures and OTT providers, emphasizing why network operators are challenged on their home turf; and (c) opportunities for business modeling and innovative telecom service offers.

Mapping Nanotechnology Innovations and Knowledge - Global and Longitudinal Patent and Literature Analysis (Paperback, 2009... Mapping Nanotechnology Innovations and Knowledge - Global and Longitudinal Patent and Literature Analysis (Paperback, 2009 ed.)
Hsinchun Chen
R2,895 Discovery Miles 28 950 Ships in 18 - 22 working days

This book defines the application of Information Technology's systematic and automated knowledge mapping methodology to collect, analyze and report nanotechnology research on a global basis. The result of these analyses is be a systematic presentation of the state of the art of nanotechnology, which will include basic analysis, content analysis, and citation network analysis of comprehensive nanotechnology findings across technology domains, inventors, institutions, and countries.

Web-Age Information Management - WAIM 2014 International Workshops: BigEM, HardBD, DaNoS, HRSUNE, BIDASYS, Macau, China, June... Web-Age Information Management - WAIM 2014 International Workshops: BigEM, HardBD, DaNoS, HRSUNE, BIDASYS, Macau, China, June 16-18, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Yueguo Chen, Wolf-Tilo Balke, Jianliang Xu, Wei Xu, Peiquan Jin, …
R2,555 Discovery Miles 25 550 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of 5 workshops of the 15th International Conference on Web-Age Information Management, WAIM 2014, held in Macau, China, June 16-18, 2014. The 38 revised full papers are organized in topical sections on the 5 following workshops: Second International Workshop on Emergency Management in Big Data Age, BigEM 2014; Second International Workshop on Big Data Management on Emerging Hardware, HardBD 2014; International Workshop on Data Management for Next-Generation Location-based Services, DaNoS 2014; International Workshop on Human Aspects of Making Recommendations in Social Ubiquitous Networking Environment, HRSUME 2014; International Workshop on Big Data Systems and Services, BIDASYS 2014.

Parallel Computing Technologies - 12th International Conference, PaCT 2013, St. Petersburg, Russia, September 30-October 4,... Parallel Computing Technologies - 12th International Conference, PaCT 2013, St. Petersburg, Russia, September 30-October 4, 2013, Proceedings (Paperback, 2013 ed.)
Victor Malyshkin
R1,452 Discovery Miles 14 520 Ships in 18 - 22 working days

This book constitutes the proceedings of the 12th International Conference on Parallel Computing Technologies, PaCT 2013, held in St. Petersburg, Russia, during September 30-October 4, 2013. The 41 full papers presented together with 2 invited papers were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on all technological aspects of the applications of parallel computer systems High level parallel programming languages and systems, methods and tools for parallel solution of large-scale problems, languages, environments and software tools supporting parallel processing, operating systems, scheduling, mapping, load balancing, general architectural concepts, cellular automata, performance measurement and analysis tools, teaching parallel processing, software for grid and cloud computing, scalable computing, fragmentation and aggregation of algorithms and programs as well as programs assembling and reuse.

Grokking Artificial Intelligence Algorithms (Paperback): Rishal Hurbans Grokking Artificial Intelligence Algorithms (Paperback)
Rishal Hurbans
R1,325 R1,098 Discovery Miles 10 980 Save R227 (17%) Ships in 5 - 10 working days

AI is primed to revolutionize the way we build applications, offering exciting new ways to solve problems, uncover insights, innovate new products, and provide better user experiences. Successful AI is based on a set of core algorithms that form a base of knowledge shared by all data scientists. Grokking Artificial Intelligence Algorithms is a fully-illustrated and interactive tutorial guide to the different approaches and algorithms that underpin AI. Written in simple language and with lots of visual references and hands-on examples, readers learn the concepts, terminology, and theory they need to effectively incorporate AI algorithms into their applications. Grokking Artificial Intelligence Algorithms uses simple language, jargon-busting explanations, and hand-drawn diagrams to open up complex algorithms. Don't worry if you aren't a calculus wunderkind; you'll need only the algebra you picked up in math class. * Use cases for different AI algorithms * How to encode problems and solutions using data structures * Intelligent search for game playing * Ant colony algorithms for path finding * Evolutionary algorithms for optimization problems For software developers with high school-level algebra and calculus skills.

Future Data and Security Engineering - 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21,... Future Data and Security Engineering - 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings (Paperback, 2014 ed.)
Tran Khanh Dang, Roland Wagner, Erich J Neuhold, Makoto Takizawa, Josef Kung, …
R2,227 Discovery Miles 22 270 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 23 full papers presented were carefully reviewed and selected from 66 submissions. They have been organized in the following topical sections: big data analytics and applications; security and privacy engineering; crowdsourcing and social network data analytics; biometrics and data protection in smart devices; cloud data management and applications; and advances in query processing and optimization.

Computer Information Systems and Industrial Management - 12th IFIP TC 8 International Conference, CISIM 2013, Krakow, Poland,... Computer Information Systems and Industrial Management - 12th IFIP TC 8 International Conference, CISIM 2013, Krakow, Poland, September 25-27, 2013, Proceedings (Paperback, 2013 ed.)
Khalid Saeed, Rituparna Chaki, Agostino Cortesi, Slawomir Wierzchon
R1,475 Discovery Miles 14 750 Ships in 18 - 22 working days

This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and biomedical applications; pattern recognition and image processing; various aspects of computer security, networking, algorithms, and industrial applications. The book also contains full papers of a keynote speech and the invited talk.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Linear and Integer…
J.E. Beasley Hardcover R3,751 Discovery Miles 37 510
Future Grid-Scale Energy Storage…
Ahmad Arabkoohsar Paperback R3,942 Discovery Miles 39 420
Cable Engineering for Local Area…
B.J. Elliott Hardcover R3,208 Discovery Miles 32 080
Transactions and Change in Logic…
Burkhard Freitag, Hendrik Decker, … Paperback R1,555 Discovery Miles 15 550
Graham Priest on Dialetheism and…
Can Baskent, Thomas Macaulay Ferguson Hardcover R4,363 Discovery Miles 43 630
The Complete Writings of Thomas Say on…
Thomas Say Paperback R606 Discovery Miles 6 060
AWS Step Functions Developer Guide
Documentation Team Hardcover R1,156 Discovery Miles 11 560
Logic Synthesis for Low Power VLSI…
Sasan Iman, Massoud Pedram Hardcover R4,145 Discovery Miles 41 450
Research Anthology on Architectures…
Information R Management Association Hardcover R12,630 Discovery Miles 126 300
PIC32 Microcontrollers and the Digilent…
Dogan Ibrahim Paperback R1,016 Discovery Miles 10 160

 

Partners