0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (66)
  • R500+ (5,381)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Unmanned Rotorcraft Systems (Paperback, Softcover reprint of the original 1st ed. 2011): Guowei Cai, Ben M. Chen, Tong Heng Lee Unmanned Rotorcraft Systems (Paperback, Softcover reprint of the original 1st ed. 2011)
Guowei Cai, Ben M. Chen, Tong Heng Lee
R4,219 Discovery Miles 42 190 Ships in 10 - 15 working days

Unmanned Rotorcraft Systems explores the research and development of fully-functional miniature UAV (unmanned aerial vehicle) rotorcraft, and provides a complete treatment of the design of autonomous miniature rotorcraft UAVs. The unmanned system is an integration of advanced technologies developed in communications, computing, and control areas, and is an excellent testing ground for trialing and implementing modern control techniques. Included are detailed expositions of systematic hardware construction, software systems integration, aerodynamic modeling; and automatic flight control system design. Emphasis is placed on the cooperative control and flight formation of multiple UAVs, vision-based ground target tracking, and landing on moving platforms. Other issues such as the development of GPS-less indoor micro aerial vehicles and vision-based navigation are also discussed in depth: utilizing the vision-based system for accomplishing ground target tracking, attacking and landing, cooperative control and flight formation of multiple unmanned rotorcraft; and future research directions on the related areas.

The Economics of Information Security and Privacy (Paperback, Softcover reprint of the original 1st ed. 2013): Rainer Boehme The Economics of Information Security and Privacy (Paperback, Softcover reprint of the original 1st ed. 2013)
Rainer Boehme
R3,864 Discovery Miles 38 640 Ships in 10 - 15 working days

In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the viability of a free and open information society. While economics and information security comprise the nucleus of an academic movement that quickly drew the attention of thinktanks, industry, and governments, the field has expanded to surrounding areas such as management of information security, privacy, and, more recently, cybercrime, all studied from an interdisciplinary angle by combining methods from microeconomics, econometrics, qualitative social sciences, behavioral sciences, and experimental economics. This book is structured in four parts, reflecting the main areas: management of information security, economics of information security, economics of privacy, and economics of cybercrime. Each individual contribution documents, discusses, and advances the state of the art concerning its specific research questions. It will be of value to academics and practitioners in the related fields.

Physical Unclonable Functions in Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 2013): Christoph... Physical Unclonable Functions in Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 2013)
Christoph Boehm, Maximilian Hofer
R3,722 Discovery Miles 37 220 Ships in 10 - 15 working days

In Physical Unclonable Functions in Theory and Practice, the authors present an in-depth overview of various topics concerning PUFs, providing theoretical background and application details. This book concentrates on the practical issues of PUF hardware design, focusing on dedicated microelectronic PUF circuits. Additionally, the authors discuss the whole process of circuit design, layout and chip verification. The book also offers coverage of: Different published approaches focusing on dedicated microelectronic PUF circuits Specification of PUF circuits General design issues Minimizing error rate from the circuit's perspective Transistor modeling issues of Montecarlo mismatch simulation and solutions Examples of PUF circuits including an accurate description of the circuits and testing/measurement results Different error rate reducing pre-selection techniques This monograph gives insight into PUFs in general and provides knowledge in the field of PUF circuit design and implementation. It could be of interest for all circuit designers confronted with PUF design, and also for professionals and students being introduced to the topic.

Introduction to Public Key Infrastructures (Paperback, Softcover reprint of the original 1st ed. 2013): Johannes A. Buchmann,... Introduction to Public Key Infrastructures (Paperback, Softcover reprint of the original 1st ed. 2013)
Johannes A. Buchmann, Evangelos Karatsiolis, Alexander Wiesmaier
R2,363 Discovery Miles 23 630 Ships in 10 - 15 working days

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.

Homomorphic Signature Schemes - A Survey (Paperback, 1st ed. 2016): Giulia Traverso, Denise Demirel, Johannes Buchmann Homomorphic Signature Schemes - A Survey (Paperback, 1st ed. 2016)
Giulia Traverso, Denise Demirel, Johannes Buchmann
R1,710 Discovery Miles 17 100 Ships in 10 - 15 working days

Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive, complete, and up-to-date survey about the state of the art of homomorphic signature schemes. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework. In addition, this work also presents a description of each of the schemes presented so far together with the properties it provides. Furthermore, three use cases, electronic voting, smart grids, and electronic health records, where homomorphic signature schemes can be employed are described. For each of these applications the requirements that a homomorphic signature scheme should fulfill are defined and the suitable schemes already available are listed. This also highlights the shortcomings of current solutions. Thus, this work concludes with several ideas for future research in the direction of homomorphic signature schemes.

Building a Comprehensive IT Security Program - Practical Guidelines and Best Practices (Paperback, 1st ed.): Jeremy Wittkop Building a Comprehensive IT Security Program - Practical Guidelines and Best Practices (Paperback, 1st ed.)
Jeremy Wittkop
R1,973 R1,753 Discovery Miles 17 530 Save R220 (11%) Ships in 10 - 15 working days

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless. Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope. Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security. Jeremy Wittkop's security expertise and critical experience provides insights into topics such as: Who is attempting to steal information and why? What are critical information assets? How are effective programs built? How is stolen information capitalized? How do we shift the paradigm to better protect our organizations? How we can make the cyber world safer for everyone to do business?

Instant Recovery with Write-Ahead Logging (Paperback, 2nd Revised edition): Goetz Graefe, Wey Guy, Caetano Sauer Instant Recovery with Write-Ahead Logging (Paperback, 2nd Revised edition)
Goetz Graefe, Wey Guy, Caetano Sauer
R1,072 Discovery Miles 10 720 Ships in 10 - 15 working days

Traditional theory and practice of write-ahead logging and of database recovery focus on three failure classes: transaction failures (typically due to deadlocks) resolved by transaction rollback; system failures (typically power or software faults) resolved by restart with log analysis, "redo," and "undo" phases; and media failures (typically hardware faults) resolved by restore operations that combine multiple types of backups and log replay. The recent addition of single-page failures and single-page recovery has opened new opportunities far beyond the original aim of immediate, lossless repair of single-page wear-out in novel or traditional storage hardware. In the contexts of system and media failures, efficient single-page recovery enables on-demand incremental "redo" and "undo" as part of system restart or media restore operations. This can give the illusion of practically instantaneous restart and restore: instant restart permits processing new queries and updates seconds after system reboot and instant restore permits resuming queries and updates on empty replacement media as if those were already fully recovered. In the context of node and network failures, instant restart and instant restore combine to enable practically instant failover from a failing database node to one holding merely an out-of-date backup and a log archive, yet without loss of data, updates, or transactional integrity. In addition to these instant recovery techniques, the discussion introduces self-repairing indexes and much faster offline restore operations, which impose no slowdown in backup operations and hardly any slowdown in log archiving operations. The new restore techniques also render differential and incremental backups obsolete, complete backup commands on a database server practically instantly, and even permit taking full up-to-date backups without imposing any load on the database server. Compared to the first version of this book, this second edition adds sections on applications of single-page repair, instant restart, single-pass restore, and instant restore. Moreover, it adds sections on instant failover among nodes in a cluster, applications of instant failover, recovery for file systems and data files, and the performance of instant restart and instant restore.

Beginning Robotics Programming in Java with LEGO Mindstorms (Paperback, 1st ed.): Wei Lu Beginning Robotics Programming in Java with LEGO Mindstorms (Paperback, 1st ed.)
Wei Lu
R1,668 R1,335 Discovery Miles 13 350 Save R333 (20%) Ships in 10 - 15 working days

Discover the difference between making a robot move and making a robot think. Using Mindstorms EV3 and LeJOS-an open source project for Java Mindstorms projects-you'll learn how to create Artificial Intelligence (AI) for your bot. Your robot will learn how to problem solve, how to plan, and how to communicate. Along the way, you'll learn about classical AI algorithms for teaching hardware how to think; algorithms that you can then apply to your own robotic inspirations. If you've ever wanted to learn about robotic intelligence in a practical, playful way, Beginning Robotics Programming in Java with LEGO Mindstorms is for you. What you'll learn: Build your first LEGO EV3 robot step-by-step Install LeJOS and its firmware on Lego EV3 Create and upload your first Java program into Lego EV3 Work with Java programming for motors Understand robotics behavior programming with sensors Review common AI algorithms, such as DFS, BFS, and Dijkstra's Algorithm Who this book is for: Students, teachers, and makers with basic Java programming experience who want to learn how to apply Artificial Intelligence to a practical robotic system.

Metaheuristic Applications to Speech Enhancement (Paperback, 1st ed. 2016): Prajna Kunche, K. V. V. S. Reddy Metaheuristic Applications to Speech Enhancement (Paperback, 1st ed. 2016)
Prajna Kunche, K. V. V. S. Reddy
R1,875 Discovery Miles 18 750 Ships in 10 - 15 working days

This book serves as a basic reference for those interested in the application of metaheuristics to speech enhancement. The major goal of the book is to explain the basic concepts of optimization methods and their use in heuristic optimization in speech enhancement to scientists, practicing engineers, and academic researchers in speech processing. The authors discuss why it has been a challenging problem for researchers to develop new enhancement algorithms that aid in the quality and intelligibility of degraded speech. They present powerful optimization methods to speech enhancement that can help to solve the noise reduction problems. Readers will be able to understand the fundamentals of speech processing as well as the optimization techniques, how the speech enhancement algorithms are implemented by utilizing optimization methods, and will be given the tools to develop new algorithms. The authors also provide a comprehensive literature survey regarding the topic.

Computational Topology in Image Context - 6th International Workshop, CTIC 2016, Marseille, France, June 15-17, 2016,... Computational Topology in Image Context - 6th International Workshop, CTIC 2016, Marseille, France, June 15-17, 2016, Proceedings (Paperback, 1st ed. 2016)
Alexandra Bac, Jean-Luc Mari
R2,417 Discovery Miles 24 170 Ships in 10 - 15 working days

This book constitutes the proceedings of the 6th International Workshop on Computational Topology in Image Context, CTIC 2016, held in Marseille, France, in June 2016. The 24 papers presented in this volume were carefully reviewed and selected from 35 submissions. Additionally, this volume contains 2 invited papers. CTIC covers a wide range of topics such as: topological invariants and their computation, homology, cohomology, linking number, fundamental groups; algorithm optimization in discrete geometry, transfer of mathematical tools, parallel computation in multi-dimensional volume context, hierarchical approaches; experimental evaluation of algorithms and heuristics; combinatorial or multi-resolution models; discrete or computational topology; geometric modeling guided by topological constraints; computational topological dynamics; and use of topological information in discrete geometry applications.

LATIN 2016: Theoretical Informatics - 12th Latin American Symposium, Ensenada, Mexico, April 11-15, 2016, Proceedings... LATIN 2016: Theoretical Informatics - 12th Latin American Symposium, Ensenada, Mexico, April 11-15, 2016, Proceedings (Paperback, 1st ed. 2016)
Evangelos Kranakis, Gonzalo Navarro, Edgar Chavez
R1,673 Discovery Miles 16 730 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th Latin American Symposium on Theoretical Informatics, LATIN 2016, held in Ensenada, Mexico, in April 2016. The 52 papers presented together with 5 abstracts were carefully reviewed and selected from 131 submissions. The papers address a variety of topics in theoretical computer science with a certain focus on algorithms (approximation, online, randomized, algorithmic game theory, etc.), analytic combinatorics and analysis of algorithms, automata theory and formal languages, coding theory and data compression, combinatorial algorithms, combinatorial optimization, combinatorics and graph theory, complexity theory, computational algebra, computational biology, computational geometry, computational number theory, cryptology, databases and information retrieval, data structures, formal methods and security, Internet and the web, parallel and distributed computing, pattern matching, programming language theory, and random structures.

Generating Plans from Proofs (Paperback): Michael Benedikt, Julien Leblay, Balder Ten Cate, Efthymia Tsamoura Generating Plans from Proofs (Paperback)
Michael Benedikt, Julien Leblay, Balder Ten Cate, Efthymia Tsamoura
R1,529 Discovery Miles 15 290 Ships in 10 - 15 working days

Query reformulation refers to a process of translating a source query-a request for information in some high-level logic-based language-into a target plan that abides by certain interface restrictions. Many practical problems in data management can be seen as instances of the reformulation problem. For example, the problem of translating an SQL query written over a set of base tables into another query written over a set of views; the problem of implementing a query via translating to a program calling a set of database APIs; the problem of implementing a query using a collection of web services. In this book we approach query reformulation in a very general setting that encompasses all the problems above, by relating it to a line of research within mathematical logic. For many decades logicians have looked at the problem of converting "implicit definitions" into "explicit definitions," using an approach known as interpolation. We will review the theory of interpolation, and explain its close connection with query reformulation. We will give a detailed look at how the interpolation-based approach is used to generate translations between logic-based queries over different vocabularies, and also how it can be used to go from logic-based queries to programs.

Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Marc Fischlin, Jean-Sebastien Coron
R3,118 Discovery Miles 31 180 Ships in 10 - 15 working days

The two-volume proceedings LNCS 9665 + 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowledge; pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leakage; in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.

Design of Visualizations for Human-Information Interaction - A Pattern-Based Framework (Paperback): Kamran Sedig, Paul Parsons Design of Visualizations for Human-Information Interaction - A Pattern-Based Framework (Paperback)
Kamran Sedig, Paul Parsons
R1,653 Discovery Miles 16 530 Ships in 10 - 15 working days

Interest in visualization design has increased in recent years. While there is a large body of existing work from which visualization designers can draw, much of the past research has focused on developing new tools and techniques that are aimed at specific contexts. Less focus has been placed on developing holistic frameworks, models, and theories that can guide visualization design at a general level-a level that transcends domains, data types, users, and other contextual factors. In addition, little emphasis has been placed on the thinking processes of designers, including the concepts that designers use, while they are engaged in a visualization design activity. In this book we present a general, holistic framework that is intended to support visualization design for human-information interaction. The framework is composed of a number of conceptual elements that can aid in design thinking. The core of the framework is a pattern language-consisting of a set of 14 basic, abstract patterns-and a simple syntax for describing how the patterns are blended. We also present a design process, made up of four main stages, for creating static or interactive visualizations. The 4-stage design process places the patterns at the core of designers' thinking, and employs a number of conceptual tools that help designers think systematically about creating visualizations based on the information they intend to represent. Although the framework can be used to design static visualizations for simple tasks, its real utility can be found when designing visualizations with interactive possibilities in mind-in other words, designing to support a human-information interactive discourse. This is especially true in contexts where interactive visualizations need to support complex tasks and activities involving large and complex information spaces. The framework is intended to be general and can thus be used to design visualizations for diverse domains, users, information spaces, and tasks in different fields such as business intelligence, health and medical informatics, digital libraries, journalism, education, scientific discovery, and others. Drawing from research in multiple disciplines, we introduce novel concepts and terms that can positively contribute to visualization design practice and education, and will hopefully stimulate further research in this area.

Tools and Algorithms for the Construction and Analysis of Systems - 22nd International Conference, TACAS 2016, Held as Part of... Tools and Algorithms for the Construction and Analysis of Systems - 22nd International Conference, TACAS 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings (Paperback, 1st ed. 2016)
Marsha Chechik, Jean-Francois Raskin
R1,746 Discovery Miles 17 460 Ships in 10 - 15 working days

This book constitutes the proceedings of the 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2016, which took place in Eindhoven, The Netherlands, in April 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016. The 44 full papers presented in this volume were carefully reviewed and selected from 175 submissions. They were organized in topical sections named: abstraction and verification; probabilistic and stochastic systems; synthesis; tool papers; concurrency; tool demos; languages and automata; security; optimization; and competition on software verification - SV-COMP.

Fuzzy Logic for Image Processing - A Gentle Introduction Using Java (Paperback, 1st ed. 2017): Laura Caponetti, Giovanna... Fuzzy Logic for Image Processing - A Gentle Introduction Using Java (Paperback, 1st ed. 2017)
Laura Caponetti, Giovanna Castellano
R2,060 Discovery Miles 20 600 Ships in 10 - 15 working days

This book provides an introduction to fuzzy logic approaches useful in image processing. The authors start by introducing image processing tasks of low and medium level such as thresholding, enhancement, edge detection, morphological filters, and segmentation and shows how fuzzy logic approaches apply. The book is divided into two parts. The first includes vagueness and ambiguity in digital images, fuzzy image processing, fuzzy rule based systems, and fuzzy clustering. The second part includes applications to image processing, image thresholding, color contrast enhancement, edge detection, morphological analysis, and image segmentation. Throughout, they describe image processing algorithms based on fuzzy logic under methodological aspects in addition to applicative aspects. Implementations in java are provided for the various applications.

Computational Collective Intelligence - 8th International Conference, ICCCI 2016, Halkidiki, Greece, September 28-30, 2016.... Computational Collective Intelligence - 8th International Conference, ICCCI 2016, Halkidiki, Greece, September 28-30, 2016. Proceedings, Part I (Paperback, 1st ed. 2016)
Ngoc Thanh Nguyen, Lazaros Iliadis, Yannis Manolopoulos, Bogdan Trawinski
R3,348 Discovery Miles 33 480 Ships in 10 - 15 working days

This two-volume set (LNAI 9875 and LNAI 9876) constitutes the refereed proceedings of the 8th International Conference on Collective Intelligence, ICCCI 2016, held in Halkidiki, Greece, in September 2016. The 108 full papers presented were carefully reviewed and selected from 277 submissions. The aim of this conference is to provide an internationally respected forum for scientific research in the computer-based methods of collective intelligence and their applications in (but not limited to) such fields as group decision making, consensus computing, knowledge integration, semantic web, social networks and multi-agent systems.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIV - Special Issue on Database- and Expert-Systems... Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIV - Special Issue on Database- and Expert-Systems Applications (Paperback, 1st ed. 2016)
Abdelkader Hameurlain, Josef Kung, Roland Wagner, Hendrik Decker, Lenka Lhotska, …
R2,181 Discovery Miles 21 810 Ships in 10 - 15 working days

This, the 24th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains extended and revised versions of seven papers presented at the 25th International Conference on Database and Expert Systems Applications, DEXA 2014, held in Munich, Germany, in September 2014. Following the conference, and two further rounds of reviewing and selection, six extended papers and one invited keynote paper were chosen for inclusion in this special issue. Topics covered include systems modeling, similarity search, bioinformatics, data pricing, k-nearest neighbor querying, database replication, and data anonymization.

Introduction to Quantum Information Science (Paperback, Softcover reprint of the original 1st ed. 2015): Masahito Hayashi,... Introduction to Quantum Information Science (Paperback, Softcover reprint of the original 1st ed. 2015)
Masahito Hayashi, Satoshi Ishizaka, Akinori Kawachi, Gen Kimura, Tomohiro Ogawa
R1,971 Discovery Miles 19 710 Ships in 10 - 15 working days

This book presents the basics of quantum information, e.g., foundation of quantum theory, quantum algorithms, quantum entanglement, quantum entropies, quantum coding, quantum error correction and quantum cryptography. The required knowledge is only elementary calculus and linear algebra. This way the book can be understood by undergraduate students. In order to study quantum information, one usually has to study the foundation of quantum theory. This book describes it from more an operational viewpoint which is suitable for quantum information while traditional textbooks of quantum theory lack this viewpoint. The current book bases on Shor's algorithm, Grover's algorithm, Deutsch-Jozsa's algorithm as basic algorithms. To treat several topics in quantum information, this book covers several kinds of information quantities in quantum systems including von Neumann entropy. The limits of several kinds of quantum information processing are given. As important quantum protocols, this book contains quantum teleportation, quantum dense coding, quantum data compression. In particular conversion theory of entanglement via local operation and classical communication are treated too. This theory provides the quantification of entanglement, which coincides with von Neumann entropy. The next part treats the quantum hypothesis testing. The decision problem of two candidates of the unknown state are given. The asymptotic performance of this problem is characterized by information quantities. Using this result, the optimal performance of classical information transmission via noisy quantum channel is derived. Quantum information transmission via noisy quantum channel by quantum error correction are discussed too. Based on this topic, the secure quantum communication is explained. In particular, the quantification of quantum security which has not been treated in existing book is explained. This book treats quantum cryptography from a more practical viewpoint.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVI - Special Issue on Data Warehousing and Knowledge... Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVI - Special Issue on Data Warehousing and Knowledge Discovery (Paperback, 1st ed. 2016)
Abdelkader Hameurlain, Josef Kung, Roland Wagner, Ladjel Bellatreche, Mukesh Mohania
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments.This volume, the 26th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, focuses on Data Warehousing and Knowledge Discovery from Big Data, and contains extended and revised versions of four papers selected as the best papers from the 16th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2014), held in Munich, Germany, during September 1-5, 2014. The papers focus on data cube computation, the construction and analysis of a data warehouse in the context of cancer epidemiology, pattern mining algorithms, and frequent item-set border approximation.

Networked Systems - Third International Conference, NETYS 2015, Agadir, Morocco, May 13-15, 2015, Revised Selected Papers... Networked Systems - Third International Conference, NETYS 2015, Agadir, Morocco, May 13-15, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Ahmed Bouajjani, Hugues Fauconnier
R3,124 Discovery Miles 31 240 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the Third International Conference on Networked Systems, NETYS 2015, held in Agadir, Morocco, in May 2015. The 29 full papers and 12 short papers presented together with 22 poster abstracts were carefully reviewed and selected from 133 submissions. They address major topics such as multi-core architectures; concurrent and distributed algorithms; middleware environments; storage clusters; social networks; peer-to-peer networks; sensor networks; wireless and mobile networks; and privacy and security measures.

Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA,... Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings (Paperback, 1st ed. 2016)
Kazue Sako
R2,900 Discovery Miles 29 000 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016. The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.

Approximation and Online Algorithms - 13th International Workshop, WAOA 2015, Patras, Greece, September 17-18, 2015. Revised... Approximation and Online Algorithms - 13th International Workshop, WAOA 2015, Patras, Greece, September 17-18, 2015. Revised Selected Papers (Paperback, 1st ed. 2015)
Laura Sanita, Martin Skutella
R2,134 Discovery Miles 21 340 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Approximation and Online Algorithms, WAOA 2015, held in Patras, Greece, in September 2015 as part of ALGO 2015. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Topics of interest for WAOA 2015 were: algorithmic game theory, algorithmic trading, coloring and partitioning, competitive analysis, computational advertising, computational finance, cuts and connectivity, geometric problems, graph algorithms, inapproximability, mechanism design, natural algorithms, network design, packing and covering, paradigms for the design and analysis of approximation and online algorithms, parameterized complexity, scheduling problems,and real-world applications.

A Polynomial Translation of Mobile Ambients into Safe Petri Nets - Understanding a Calculus of Hierarchical Protection Domains... A Polynomial Translation of Mobile Ambients into Safe Petri Nets - Understanding a Calculus of Hierarchical Protection Domains (Paperback, 1st ed. 2016)
Susanne Goebel
R1,672 Discovery Miles 16 720 Ships in 10 - 15 working days

The master thesis of Susanne Goebel generates the deep understanding of the Mobile Ambient (MA) calculus that is necessary to use it as a modeling language. Instead of calculus terms a much more convenient representation via MA trees naturally maps to the application area of networks where processes pass hierarchical protection domains like firewalls. The work analyses MA's function principles and derives a translation into Safe Petri nets. It extends to arbitrary MA processes but finiteness of the net and therefore decidability of reachability is only guaranteed for bounded processes. The construction is polynomial in process size and bounds so that reachability analysis is only PSPACE-complete.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXV (Paperback, 1st ed. 2016): Abdelkader Hameurlain, Josef... Transactions on Large-Scale Data- and Knowledge-Centered Systems XXV (Paperback, 1st ed. 2016)
Abdelkader Hameurlain, Josef Kung, Roland Wagner
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This, the 25th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five fully revised selected papers focusing on data and knowledge management systems. Topics covered include a framework consisting of two heuristics with slightly different characteristics to compute the action rating of data stores, a theoretical and experimental study of filter-based equijoins in a MapReduce environment, a constraint programming approach based on constraint reasoning to study the view selection and data placement problem given a limited amount of resources, a formalization and an approximate algorithm to tackle the problem of source selection and query decomposition in federations of SPARQL endpoints, and a matcher factory enabling the generation of a dedicated schema matcher for a given schema matching scenario.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
An Outline History of Greece
John Heyl Vincent Paperback R440 Discovery Miles 4 400
Academic Literacy
Litha Beekman, Cecilia Dube, … Paperback  (1)
R487 Discovery Miles 4 870
German Grammar - QuickStudy Laminated…
BarCharts Inc Fold-out book or chart R644 Discovery Miles 6 440
Introductory Lectures on Modern History…
Thomas Arnold Paperback R523 Discovery Miles 5 230
SLLA Secrets Study Guide - SLLA Test…
Mometrix Teacher Certification Test Te Paperback R1,724 R1,375 Discovery Miles 13 750
SHRM CP Exam Prep - SHRM CP…
Matthew Bowling Paperback R1,642 R1,326 Discovery Miles 13 260
Saxon Studies
Julian Hawthorne Paperback R641 Discovery Miles 6 410
Dissertation Writing - A Research…
Cecile Badenhorst Paperback R665 R615 Discovery Miles 6 150
Christian Heritage (Teacher Guide)
Marilyn Boyer Paperback R575 R484 Discovery Miles 4 840
Mindcraft - The Theory And Practice Of…
Franzel du Plooy-Cilliers, Jared Smith Paperback R457 R386 Discovery Miles 3 860

 

Partners