|
|
Books > Computing & IT > General theory of computing
Cryptography is concerned with the construction of schemes that
withstand any abuse. A cryptographic scheme is constructed so as to
maintain a desired functionality, even under malicious attempts
aimed at making it deviate from its prescribed behavior. The design
of cryptographic systems must be based on firm foundations, whereas
ad hoc approaches and heuristics are a very dangerous way to go.
These foundations were developed mostly in the 1980s, in works that
are all co-authored by Shafi Goldwasser and/or Silvio Micali. These
works have transformed cryptography from an engineering discipline,
lacking sound theoretical foundations, into a scientific field
possessing a well-founded theory, which influences practice as well
as contributes to other areas of theoretical computer science. This
book celebrates these works, which were the basis for bestowing the
2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A
significant portion of this book reproduces some of these works,
and another portion consists of scientific perspectives by some of
their former students. The highlight of the book is provided by a
few chapters that allow the readers to meet Shafi and Silvio in
person. These include interviews with them, their biographies and
their Turing Award lectures.
As the progression of the internet continues, society is finding
easier, quicker ways of simplifying their needs with the use of
technology. With the growth of lightweight devices, such as smart
phones and wearable devices, highly configured hardware is in
heightened demand in order to process the large amounts of raw data
that are acquired. Connecting these devices to fog computing can
reduce bandwidth and latency for data transmission when associated
with centralized cloud solutions and uses machine learning
algorithms to handle large amounts of raw data. The risks that
accompany this advancing technology, however, have yet to be
explored. Architecture and Security Issues in Fog Computing
Applications is a pivotal reference source that provides vital
research on the architectural complications of fog processing and
focuses on security and privacy issues in intelligent fog
applications. While highlighting topics such as machine learning,
cyber-physical systems, and security applications, this publication
explores the architecture of intelligent fog applications enabled
with machine learning. This book is ideally designed for IT
specialists, software developers, security analysts, software
engineers, academicians, students, and researchers seeking current
research on network security and wireless systems.
FINANCIAL FREEDOM IS JUST A DISTANT DREAM FOR MANY OF US. BUT WHAT
IF I TELL YOU THAT THERE IS AN EASY WAY FOR YOU TO EARN A PASSIVE
INCOME WITH LITTLE TO NO INVESTMENT? Yes, you read that right! Many
people think that the only way to earn more and to save more is to
stick it out with the 9-to-5 grind. However, they could not be more
mistaken. This book will give you important information on how to
earn PASSIVE income, and not just that! This supplemental income
can eventually become your key to financial freedom if you do
things right, and this book will tell you how! In this book, you
will find all the critical information you need to get started with
affiliate marketing. PLUS included is a BONUS training course -
FREE 4 Day blueprint on how to build a profitable online business
with affiliate marketing The key to your financial freedom is
between the pages of this book, and the time to get started is NOW!
The Internet of Medical Things (IoMT) allows clinicians to monitor
patients remotely via a network of wearable or implantable devices.
The devices are embedded with software or sensors to enable them to
send and receive data via the internet so that healthcare
professionals can monitor health data such as vital statistics,
metabolic rates or drug delivery regimens, and can provide advice
or treatment plans based on this real-world, real-time data. This
edited book discusses key IoT technologies that facilitate and
enhance this process, such as computer algorithms, network
architecture, wireless communications, and network security.
Providing a systemic review of trends, challenges and future
directions of IoMT technologies, the book examines applications
such as breast cancer monitoring systems, patient-centric systems
for handling, tracking and monitoring virus variants, and
video-based solutions for monitoring babies. The book discusses
machine learning techniques for the management of clinical data and
includes security issues such as the use of blockchain technology.
Written by a range of international researchers, this book is a
great resource for computer engineering researchers and
practitioners in the fields of data mining, machine learning,
artificial intelligence and the IoT in the healthcare sector.
Advances in Nonvolatile Memory and Storage Technology, Second
Edition, addresses recent developments in the non-volatile memory
spectrum, from fundamental understanding, to technological aspects.
The book provides up-to-date information on the current memory
technologies as related by leading experts in both academia and
industry. To reflect the rapidly changing field, many new chapters
have been included to feature the latest in RRAM technology,
STT-RAM, memristors and more. The new edition describes the
emerging technologies including oxide-based ferroelectric memories,
MRAM technologies, and 3D memory. Finally, to further widen the
discussion on the applications space, neuromorphic computing
aspects have been included. This book is a key resource for
postgraduate students and academic researchers in physics,
materials science and electrical engineering. In addition, it will
be a valuable tool for research and development managers concerned
with electronics, semiconductors, nanotechnology, solid-state
memories, magnetic materials, organic materials and portable
electronic devices.
Recent advances in information and communication technologies have
enhanced the standards of metropolitan planning and development.
With the increase in mobile communication, this will help to
deliver innovative new services and apps in the field of urban
e-planning. New Approaches, Methods, and Tools in Urban E-Planning
is a key resource for the latest academic research on recent
innovations in urban e-planning, citizen e-participation, the use
of social media, and new forms of data collection and idea
generation for urban planning. Presenting broad coverage among a
variety of pertinent views and themes such as ethnography,
e-consultation, and civic engagement, this book is ideally designed
for planners, policymakers, researchers, and graduate students
interested in how recent technological advancements are enhancing
the traditional practices in e-planning.
Social media has emerged as a powerful tool that reaches a wide
audience with minimum time and effort. It has a diverse role in
society and human life and can boost the visibility of information
that allows citizens the ability to play a vital role in creating
and fostering social change. This practice can have both positive
and negative consequences on society. Examining the Roles of IT and
Social Media in Democratic Development and Social Change is a
collection of innovative research on the methods and applications
of social media within community development and democracy. While
highlighting topics including information capitalism, ethical
issues, and e-governance, this book is ideally designed for social
workers, politicians, public administrators, sociologists,
journalists, policymakers, government administrators, academicians,
researchers, and students seeking current research on social
advancement and change through social media and technology.
With technology creating a more competitive market, the global
economy has been continually evolving in recent years. These
technological developments have drastically changed the ways
organizations manage their resources, as they are constantly
seeking innovative methods to implement new systems. Because of
this, there is an urgent need for empirical research that studies
advancing theories and applications that organizations can use to
successfully handle information and supplies. Novel Theories and
Applications of Global Information Resource Management is a pivotal
reference source that provides vital research on developing
practices for businesses to effectively manage their assets on a
global scale. While highlighting topics such as enterprise systems,
library management, and information security, this publication
explores the implementation of technological innovation into
business techniques as well as the methods of controlling
information in a contemporary society. This book is ideally
designed for brokers, accountants, marketers, researchers, data
scientists, financiers, managers, and academicians seeking current
research on global resource management.
Quality assurance is an essential aspect for ensuring the success
of corporations worldwide. Consistent quality requirements across
organizations of similar types ensure that these requirements can
be accurately and easily evaluated. Shaping the Future Through
Standardization is an essential scholarly book that examines
quality and standardization within diverse organizations globally
with a special focus on future perspectives, including how
standards and standardization may shape the future. Featuring a
wide range of topics such as economics, pedagogy, and management,
this book is ideal for academicians, researchers, decision makers,
policymakers, managers, corporate professionals, and students.
As technology continues to develop, the healthcare industry must
adapt and implement new technologies and services. Recent
advancements, opportunities, and challenges for bio-medical image
processing and authentication in telemedicine must be considered to
ensure patients receive the best possible care. Advancements in
Bio-Medical Image Processing and Authentication in Telemedicine
introduces recent advancements, opportunities, and challenges for
bio-medical image processing and authentication in telemedicine and
discusses the design of high-accuracy decision support systems.
Covering key topics such as artificial intelligence, medical
imaging, telemedicine, and technology, this premier reference
source is ideal for medical professionals, nurses, policymakers,
researchers, scholars, academicians, practitioners, instructors,
and students.
Over the last two decades, researchers are looking at imbalanced
data learning as a prominent research area. Many critical
real-world application areas like finance, health, network, news,
online advertisement, social network media, and weather have
imbalanced data, which emphasizes the research necessity for
real-time implications of precise fraud/defaulter detection, rare
disease/reaction prediction, network intrusion detection, fake news
detection, fraud advertisement detection, cyber bullying
identification, disaster events prediction, and more. Machine
learning algorithms are based on the heuristic of
equally-distributed balanced data and provide the biased result
towards the majority data class, which is not acceptable
considering imbalanced data is omnipresent in real-life scenarios
and is forcing us to learn from imbalanced data for foolproof
application design. Imbalanced data is multifaceted and demands a
new perception using the novelty at sampling approach of data
preprocessing, an active learning approach, and a cost perceptive
approach to resolve data imbalance. The Handbook of Research on
Data Preprocessing, Active Learning, and Cost Perceptive Approaches
for Resolving Data Imbalance offers new aspects for imbalanced data
learning by providing the advancements of the traditional methods,
with respect to big data, through case studies and research from
experts in academia, engineering, and industry. The chapters
provide theoretical frameworks and the latest empirical research
findings that help to improve the understanding of the impact of
imbalanced data and its resolving techniques based on data
preprocessing, active learning, and cost perceptive approaches.
This book is ideal for data scientists, data analysts, engineers,
practitioners, researchers, academicians, and students looking for
more information on imbalanced data characteristics and solutions
using varied approaches.
|
You may like...
Mingus Dynasty
Charles Mingus
Vinyl record
R398
R378
Discovery Miles 3 780
She
Harry Jr. Connick
CD
R122
Discovery Miles 1 220
|