![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking > General
This book constitutes the refereed proceedings of the 4th International Symposium on Ubiquitous Networking, UNet 2018, held in Hammamet, Morocco, in May 2018. The 35 full papers presented together with 5 short papers in this volume were carefully reviewed and selected from 87 submissions. The focus of UNet is on technical challenges and solutions related to such a widespread adoption of networking technologies, including broadband multimedia, machine-to-machine applications, Internet of things, security and privacy, data engineering, sensor networks and RFID technologies.
This book constitutes the refereed post-conference proceedings of the 8th International Conference on Big Data Technologies and Applications, BDTA 2017, held in Gwangju, South Korea, in November 2017. The 15 revised full papers were carefully reviewed and selected from 25 submissions and handle theoretical foundations and practical applications which premise the new generation of data analytics and engineering. The contributions deal with following topics: privacy and security, image processing, context awareness, s/w engineering and e-commerce, social media and health care.
The four-volume set LNCS 11244, 11245, 11246, and 11247 constitutes the refereed proceedings of the 8th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2018, held in Limassol, Cyprus, in October/November 2018. The papers presented were carefully reviewed and selected for inclusion in the proceedings. Each volume focusses on an individual topic with topical section headings within the volume: Part I, Modeling: Towards a unified view of modeling and programming; X-by-construction, STRESS 2018. Part II, Verification: A broader view on verification: from static to runtime and back; evaluating tools for software verification; statistical model checking; RERS 2018; doctoral symposium. Part III, Distributed Systems: rigorous engineering of collective adaptive systems; verification and validation of distributed systems; and cyber-physical systems engineering. Part IV, Industrial Practice: runtime verification from the theory to the industry practice; formal methods in industrial practice - bridging the gap; reliable smart contracts: state-of-the-art, applications, challenges and future directions; and industrial day.
This book provides a general and comprehensible overview of imbalanced learning. It contains a formal description of a problem, and focuses on its main features, and the most relevant proposed solutions. Additionally, it considers the different scenarios in Data Science for which the imbalanced classification can create a real challenge. This book stresses the gap with standard classification tasks by reviewing the case studies and ad-hoc performance metrics that are applied in this area. It also covers the different approaches that have been traditionally applied to address the binary skewed class distribution. Specifically, it reviews cost-sensitive learning, data-level preprocessing methods and algorithm-level solutions, taking also into account those ensemble-learning solutions that embed any of the former alternatives. Furthermore, it focuses on the extension of the problem for multi-class problems, where the former classical methods are no longer to be applied in a straightforward way. This book also focuses on the data intrinsic characteristics that are the main causes which, added to the uneven class distribution, truly hinders the performance of classification algorithms in this scenario. Then, some notes on data reduction are provided in order to understand the advantages related to the use of this type of approaches. Finally this book introduces some novel areas of study that are gathering a deeper attention on the imbalanced data issue. Specifically, it considers the classification of data streams, non-classical classification problems, and the scalability related to Big Data. Examples of software libraries and modules to address imbalanced classification are provided. This book is highly suitable for technical professionals, senior undergraduate and graduate students in the areas of data science, computer science and engineering. It will also be useful for scientists and researchers to gain insight on the current developments in this area of study, as well as future research directions.
This two-volume set (CCIS 905 and CCIS 906) constitutes the refereed proceedings of the Second International Conference on Advances in Computing and Data Sciences, ICACDS 2018, held in Dehradun, India, in April 2018. The 110 full papers were carefully reviewed and selected from 598 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations.
This book constitutes the refereed post-conference proceedings of the 25th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2018, held in Ma'ale HaHamisha, Israel, in June 2018. The 23 full papers and 8 short papers presented were carefully reviewed and selected from 47 submissions. They are devoted to the study of the interplay between structural knowledge, communications, and computing in decentralized systems of multiple communicating entities and cover a large range of topics.
The four-volume set LNCS 11244, 11245, 11246, and 11247 constitutes the refereed proceedings of the 8th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2018, held in Limassol, Cyprus, in October/November 2018. The papers presented were carefully reviewed and selected for inclusion in the proceedings. Each volume focusses on an individual topic with topical section headings within the volume: Part I, Modeling: Towards a unified view of modeling and programming; X-by-construction, STRESS 2018. Part II, Verification: A broader view on verification: from static to runtime and back; evaluating tools for software verification; statistical model checking; RERS 2018; doctoral symposium. Part III, Distributed Systems: rigorous engineering of collective adaptive systems; verification and validation of distributed systems; and cyber-physical systems engineering. Part IV, Industrial Practice: runtime verification from the theory to the industry practice; formal methods in industrial practice - bridging the gap; reliable smart contracts: state-of-the-art, applications, challenges and future directions; and industrial day.
As a result of its widespread implementation in economic and social structures, the network concept appears to be a paradigm of the contemporary world. The need for various services - transport, energy, consumption of manufacturing goods, provision of care, information and communication, etc. - draws users into interwoven networks which are meshes of material and immaterial flows. In this context, the user is a consumer of goods and services from industries and administrations, or they themselves are part of the organization (digital social networks). This book examines the invariants that unify networks in their diversity, as well as the specificities that differentiate them. It provides a reading grid that distinguishes a generic level where these systems find a common interpretation, and a specific level where appropriate analytical methods are used. Three case studies from different fields are presented to illustrate the purpose of the book in detail.
Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise. Join Microsoft MVP Josh Garverick as he addresses all major areas of design and implementation-application, infrastructure, data, security, and deployment-while leveraging the power and tools of Visual Studio Team Services (VSTS) to bring DevOps to the forefront. With an emphasis on principles and best practices of enterprise design, you will discover how to recognize existing patterns within the legacy platform and to identify potential risks, bottlenecks, and candidates for automation. What You'll Learn Accurately and completely capture baseline information about a legacy system Leverage enterprise patterns for constructing next-generation platforms in the cloud Design, plan, and implement deployment pipelines to enable continuous delivery Identify and implement cloud-based platform components to reduce total cost of ownership Understand testing and validation: iterative component authoring, monitoring, deployment, and performance Price and perform capacity planning for cloud-based infrastructure and workloads Who This Book Is For Enterprise architects and IT professionals who are required to keep legacy applications relevant in today's cloud-first world
This book constitutes the thoroughly refereed papers of the First International Conference on Applied Informatics, ICAI 2018, held in Bogota, Colombia, in November 2018. The 27 full papers were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on data analysis; decision systems; health care information systems; IT architectures; learning management systems; mobile information processing systems; robotic autonomy; software design engineering.
This book constitutes the refereed conference proceedings of the 12th International Conference on Multi-disciplinary Trends in Artificial Intelligence, MIWAI 2018, held in Hanoi, Vietnam, in November 2018. The 16 full papers presented together with 9 short papers were carefully reviewed and selected from 65 submissions. They are organized in the following topical sections: control, planning and scheduling, pattern recognition, knowledge mining, software applications, strategy games and others.
Use DevOps principles with Google Cloud Platform (GCP) to develop applications and services. This book builds chapter by chapter to a complete real-life scenario, explaining how to build, monitor, and maintain a complete application using DevOps in practice. Starting with core DevOps concepts, continuous integration, and continuous delivery, you'll cover common tools including Jenkins, Docker, and Kubernetes in the context of a real microservices application to deploy in the cloud. You will also create a monitor for your cloud and see how to use its data to prevent errors and improve the stability of the system. By the end of Pro DevOps with Google Cloud Platform, you will be able to deploy, maintain, and monitor a real application with GCP. What You Will Learn Build and deploy applications and services using DevOps on Google Cloud Platform Maintain a complete continuous integration (CI) and continuous delivery (CD) pipeline Use containerization with Docker and Kubernetes Carry out CD with GCP and Jenkins Create microservices with Jenkins, Docker, and Kubernetes Monitor your newly deployed application and its deployment and performance Set up security and manage your network with GCP Who This Book Is For Developers and software architects who want to implement DevOps in practice. Some prior programming experience is recommended as well as a basic knowledge of a Linux command-line environment.
This book constitutes the refereed proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2018, held in Tokyo, Japan, in November 2018. The 24 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized into three tracks reflecting major trends related to distributed systems: theoretical and practical aspects of stabilizing systems; distributed networks and concurrency; and safety in malicious environments.
This two-volume set (CCIS 905 and CCIS 906) constitutes the refereed proceedings of the Second International Conference on Advances in Computing and Data Sciences, ICACDS 2018, held in Dehradun, India, in April 2018. The 110 full papers were carefully reviewed and selected from 598 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations.
This book constitutes the thoroughly refereed papers of the workshops held at the 8th International Conference on New Trends in Model and Data Engineering, MEDI 2018, in Marrakesh, Morocco, in October 2018. The 19 full and the one short workshop papers were carefully reviewed and selected from 50 submissions. The papers are organized according to the 4 workshops: International Workshop on Modeling, Verification and Testing of Dependable Critical Systems, DETECT 2018, Model and Data Engineering for Social Good Workshop, MEDI4SG 2018, Second International Workshop on Cybersecurity and Functional Safety in Cyber-Physical Systems, IWCFS 2018, International Workshop on Formal Model for Mastering Multifaceted Systems, REMEDY 2018.
This book constitutes the refereed joint proceedings of the 7th Joint International Workshop on Computing and Visualization for Intravascular Imaging and Computer Assisted Stenting, CVII-STENT 2018, and the Third International Workshop on Large-Scale Annotation of Biomedical Data and Expert Label Synthesis, LABELS 2018, held in conjunction with the 21th International Conference on Medical Imaging and Computer-Assisted Intervention, MICCAI 2018, in Granada, Spain, in September 2018. The 9 full papers presented at CVII-STENT 2017 and the 12 full papers presented at LABELS 2017 were carefully reviewed and selected. The CVII-STENT papers feature the state of the art in imaging, treatment, and computer-assisted intervention in the field of endovascular interventions. The LABELS papers present a variety of approaches for dealing with few labels, from transfer learning to crowdsourcing.
This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications.
This book (CCIS 839) constitutes the refereed proceedings of the First International Conference on Communication, Networks and Computings, CNC 2018, held in Gwalior, India, in March 2018. The 70 full papers were carefully reviewed and selected from 182 submissions. The papers are organized in topical sections on wired and wireless communication systems, high dimensional data representation and processing, networks and information security, computing techniques for efficient networks design, electronic circuits for communication system.
Although there are countless books on statistics, few are dedicated to the application of statistical methods to software engineering. Simple Statistical Methods for Software Engineering: Data and Patterns fills that void. Instead of delving into overly complex statistics, the book details simpler solutions that are just as effective and connect with the intuition of problem solvers. Sharing valuable insights into software engineering problems and solutions, the book not only explains the required statistical methods, but also provides many examples, review questions, and case studies that provide the understanding required to apply those methods to real-world problems. After reading this book, practitioners will possess the confidence and understanding to solve day-to-day problems in quality, measurement, performance, and benchmarking. By following the examples and case studies, students will be better prepared able to achieve seamless transition from academic study to industry practices. Includes boxed stories, case studies, and illustrations that demonstrate the nuances behind proper application Supplies historical anecdotes and traces statistical methods to inventors and gurus Applies basic statistical laws in their simplest forms to resolve engineering problems Provides simple techniques for addressing the issues software engineers face The book starts off by reviewing the essential facts about data. Next, it supplies a detailed review and summary of metrics, including development, maintenance, test, and agile metrics. The third section covers the fundamental laws of probability and statistics and the final section presents special data patterns in the form of tailed mathematical distributions. In addition to selecting simpler and more flexible tools, the authors have also simplified several standard techniques to provide you with the set of intellectual tools al
5G Core Networks: Powering Digitalization provides an overview of the 5G Core network architecture, as well as giving descriptions of cloud technologies and the key concepts in the 3GPP rel-15/16 specifications. Written by the authors who are heavily involved in development of the 5G standards and who wrote the successful book on EPC and 4G Packet Networks, this book provides an authoritative reference on the technologies and standards of the 3GPP 5G Core network. Content includes: An overview of the 5G Core Architecture The Stand-Alone and Non-Stand-Alone Architectures Detailed presentation of 5G Core key concepts An overview of 5G Radio and Cloud technologies Learn The differences between the 5G Core network and previous core network generations How the interworking with previous network standards is defined Why certain functionality has been included and what is beyond the scope of 5G Core How the specifications relate to state-of-the-art web-scale concepts and virtualization technologies Details of the protocol and service descriptions Examples of network deployment options
Graph data modeling and querying arises in many practical application domains such as social and biological networks where the primary focus is on concepts and their relationships and the rich patterns in these complex webs of interconnectivity. In this book, we present a concise unified view on the basic challenges which arise over the complete life cycle of formulating and processing queries on graph databases. To that purpose, we present all major concepts relevant to this life cycle, formulated in terms of a common and unifying ground: the property graph data model-the pre-dominant data model adopted by modern graph database systems. We aim especially to give a coherent and in-depth perspective on current graph querying and an outlook for future developments. Our presentation is self-contained, covering the relevant topics from: graph data models, graph query languages and graph query specification, graph constraints, and graph query processing. We conclude by indicating major open research challenges towards the next generation of graph data management systems.
This book presents the most important fault-tolerant distributed programming abstractions and their associated distributed algorithms, in particular in terms of reliable communication and agreement, which lie at the heart of nearly all distributed applications. These programming abstractions, distributed objects or services, allow software designers and programmers to cope with asynchrony and the most important types of failures such as process crashes, message losses, and malicious behaviors of computing entities, widely known under the term "Byzantine fault-tolerance". The author introduces these notions in an incremental manner, starting from a clear specification, followed by algorithms which are first described intuitively and then proved correct. The book also presents impossibility results in classic distributed computing models, along with strategies, mainly failure detectors and randomization, that allow us to enrich these models. In this sense, the book constitutes an introduction to the science of distributed computing, with applications in all domains of distributed systems, such as cloud computing and blockchains. Each chapter comes with exercises and bibliographic notes to help the reader approach, understand, and master the fascinating field of fault-tolerant distributed computing.
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics
This book constitutes the refereed proceedings of the 19th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2018, held in Poitiers, France, in September 2018. The 52 full papers presented in this volume were carefully reviewed and selected from 91 submissions. They were organized in topical sections named: video analysis; segmentation and classification; remote sending; biometrics; deep learning; coding and compression; and image restauration and reconstruction.
This book constitutes the refereed proceedings of the Third International Conference on New Trends in Information and Communications Technology Applications, NTICT 2018, held in Baghdad, Iraq, in October 2018.The 18 papers presented were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections, namely: Computer networks; system and network security; machine learning; intelligent control system; communication applications; computer vision; and e-learning. |
![]() ![]() You may like...
Quantum Computing For Dummies
William Hurley, Floyd Earl Smith
Paperback
Privacy and Legal Issues in Cloud…
Anne S.Y. Cheung, Rolf H. Weber
Paperback
R1,383
Discovery Miles 13 830
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
5G-Enabled Internet of Things
Yulei Wu, Haojun Huang, …
Paperback
|