|
|
Books > Computing & IT > Internet
This book covers and makes four major contributions: 1) analyzing
and surveying the pros and cons of current approaches for
identifying rumor sources on complex networks; 2) proposing a novel
approach to identify rumor sources in time-varying networks; 3)
developing a fast approach to identify multiple rumor sources; 4)
proposing a community-based method to overcome the scalability
issue in this research area. These contributions enable rumor
source identification to be applied effectively in real-world
networks, and eventually diminish rumor damages, which the authors
rigorously illustrate in this book. In the modern world, the
ubiquity of networks has made us vulnerable to various risks. For
instance, viruses propagate throughout the Internet and infect
millions of computers. Misinformation spreads incredibly fast in
online social networks, such as Facebook and Twitter. Infectious
diseases, such as SARS, H1N1 or Ebola, have spread geographically
and killed hundreds of thousands people. In essence, all of these
situations can be modeled as a rumor spreading through a network,
where the goal is to find the source of the rumor so as to control
and prevent network risks. So far, extensive work has been done to
develop new approaches to effectively identify rumor sources.
However, current approaches still suffer from critical weaknesses.
The most serious one is the complex spatiotemporal diffusion
process of rumors in time-varying networks, which is the bottleneck
of current approaches. The second problem lies in the expensively
computational complexity of identifying multiple rumor sources. The
third important issue is the huge scale of the underlying networks,
which makes it difficult to develop efficient strategies to quickly
and accurately identify rumor sources. These weaknesses prevent
rumor source identification from being applied in a broader range
of real-world applications. This book aims to analyze and address
these issues to make rumor source identification more effective and
applicable in the real world. The authors propose a novel reverse
dissemination strategy to narrow down the scale of suspicious
sources, which dramatically promotes the efficiency of their
method. The authors then develop a Maximum-likelihood estimator,
which can pin point the true source from the suspects with high
accuracy. For the scalability issue in rumor source identification,
the authors explore sensor techniques and develop a community
structure based method. Then the authors take the advantage of the
linear correlation between rumor spreading time and infection
distance, and develop a fast method to locate the rumor diffusion
source. Theoretical analysis proves the efficiency of the proposed
method, and the experiment results verify the significant
advantages of the proposed method in large-scale networks. This
book targets graduate and post-graduate students studying computer
science and networking. Researchers and professionals working in
network security, propagation models and other related topics, will
also be interested in this book.
This book introduces social manufacturing, the next generation
manufacturing paradigm that covers product life cycle activities
that deal with Internet-based organizational and interactive
mechanisms under the context of socio-technical systems in the
fields of industrial and production engineering. Like its subject,
the book's approach is multi-disciplinary, including manufacturing
systems, operations management, computational social sciences and
information systems applications. It reports on the latest research
findings regarding the social manufacturing paradigm, the
architecture, configuration and execution of social manufacturing
systems and more. Further, it describes the individual technologies
enabled by social manufacturing for each topic, supported by case
studies. The technologies discussed include manufacturing resource
minimalization and their socialized reorganizations, blockchain
models in cybersecurity, computing and decision-making, social
business relationships and organizational networks, open product
design, social sensors and extended cyber-physical systems, and
social factory and inter-connections. This book helps engineers and
managers in industry to practice social manufacturing, as well as
offering a systematic reference resource for researchers in
manufacturing. Students also benefit from the detailed discussions
of the latest research and technologies that will have been put
into practice by the time they graduate.
Computer-mediated communication and cyberculture are
dramatically changing the nature of social relationships. Whether
cyberspace will simply retain vestiges of traditional communities
with hierarchical social links and class-structured relationships
or create new egalitarian social networks remains an open question.
The chapters in this volume examine the issue of social justice on
the Internet by using a variety of methodological and theoretical
perspectives.
Political scientists, sociologists, and communications and
information systems scholars address issues of race, class, and
gender on the Internet in chapters that do not assume any
specialized training in computer technology.
This book provides a comprehensive introduction to applying
compressive sensing to improve data quality in the context of
mobile crowdsensing. It addresses the following main topics:
recovering missing data, efficiently collecting data, preserving
user privacy, and detecting false data. Mobile crowdsensing, as an
emerging sensing paradigm, enables the masses to take part in data
collection tasks with the aid of powerful mobile devices. However,
mobile crowdsensing platforms have yet to be widely adopted in
practice, the major concern being the quality of the data
collected. There are numerous causes: some locations may generate
redundant data, while others may not be covered at all, since the
participants are rarely systematically coordinated; privacy is a
concern for some people, who don't wish to share their real-time
locations, and therefore some key information may be missing;
further, some participants may upload fake data in order to
fraudulently gain rewards. To address these problematic aspects,
compressive sensing, which works by accurately recovering a sparse
signal using very few samples, has proven to offer an effective
solution.
Cyber-physical systems play a crucial role in connecting aspects of
online life to physical life. By studying emerging trends in these
systems, programming techniques can be optimized and strengthened
to create a higher level of effectiveness. Solutions for
Cyber-Physical Systems Ubiquity is a critical reference source that
discusses the issues and challenges facing the implementation,
usage, and challenges of cyber-physical systems. Highlighting
relevant topics such as the Internet of Things, smart-card
security, multi-core environments, and wireless sensor nodes, this
scholarly publication is ideal for engineers, academicians,
computer science students, and researchers that would like to stay
abreast of current methodologies and trends involving
cyber-physical system progression. Topics Covered The many academic
areas covered in this publication include, but are not limited to:
Automotive Domain Internet of Things Multi-Core Environments Safety
Concerns Security strategies Smart Card Security System
Verification Wireless Sensor Nodes
As software and computer hardware grows in complexity, networks
have grown to match. The increasing scale, complexity,
heterogeneity, and dynamism of communication networks, resources,
and applications has made distributed computing systems brittle,
unmanageable, and insecure. Internet and Distributed Computing
Advancements: Theoretical Frameworks and Practical Applications is
a vital compendium of chapters on the latest research within the
field of distributed computing, capturing trends in the design and
development of Internet and distributed computing systems that
leverage autonomic principles and techniques. The chapters provided
within this collection offer a holistic approach for the
development of systems that can adapt themselves to meet
requirements of performance, fault tolerance, reliability,
security, and Quality of Service (QoS) without manual intervention.
Advances in Electronic Business, Volume 1 advances the
understanding of management methods, information technology, and
their joint application in business processes. The applications of
electronic commerce draw great attention of the practitioners in
applying digital technologies to the buy-and-sell activities. This
first volume addresses the importance of management and technology
issues in electronic business, including collaborative design,
collaborative engineering, collaborative decision making,
electronic collaboration, communication and cooperation, workflow
collaboration, knowledge networking, collaborative e-learning,
costs and benefits analysis of collaboration, collaborative
transportation, and ethics.
Since the dawn of the digital era, the transfer of knowledge has
shifted from analog to digital, local to global, and individual to
social. Complex networked communities are a fundamental part of
these new information-based societies. Emerging Pedagogies in the
Networked Knowledge Society: Practices Integrating Social Media and
Globalization examines the production, dissemination, and
consumption of knowledge within networked communities in the wider
global context of pervasive Web 2.0 and social media services. This
book will offer insight for business stakeholders, researchers,
scholars, and administrators by highlighting the important concepts
and ideas of information- and knowledge-based economies.
This classroom-tested textbook describes the design and
implementation of software for distributed real-time systems, using
a bottom-up approach. The text addresses common challenges faced in
software projects involving real-time systems, and presents a novel
method for simply and effectively performing all of the software
engineering steps. Each chapter opens with a discussion of the core
concepts, together with a review of the relevant methods and
available software. This is then followed with a description of the
implementation of the concepts in a sample kernel, complete with
executable code. Topics and features: introduces the fundamentals
of real-time systems, including real-time architecture and
distributed real-time systems; presents a focus on the real-time
operating system, covering the concepts of task, memory, and
input/output management; provides a detailed step-by-step
construction of a real-time operating system kernel, which is then
used to test various higher level implementations; describes
periodic and aperiodic scheduling, resource management, and
distributed scheduling; reviews the process of application design
from high-level design methods to low-level details of design and
implementation; surveys real-time programming languages and fault
tolerance techniques; includes end-of-chapter review questions,
extensive C code, numerous examples, and a case study implementing
the methods in real-world applications; supplies additional
material at an associated website. Requiring only a basic
background in computer architecture and operating systems, this
practically-oriented work is an invaluable study aid for senior
undergraduate and graduate-level students of electrical and
computer engineering, and computer science. The text will also
serve as a useful general reference for researchers interested in
real-time systems.
Let an award-winning school library media specialist who has
implemented a local area network (LAN) in her media center help you
plan this important addition to your media center while avoiding
the pitfalls. This hands-on practical guide contains all the
information the network novice needs to plan, fund, create, and
maintain a LAN in the media center. Based on the experience of the
school library media specialist who received the 1994 Follett/AASL
"Microcomputer in the Media Center Award" for creating a local area
network in the high school media center, this guide describes the
procedures for planning, designing, funding, installing,
organizing, training, evaluating, and maintaining a LAN in a
library media center setting. Step-by-step nontechnical
instructions and advice for creating an information network are
presented in an understandable format. How to expand into a
school-district wide area network (WAN) and gain access to the
Internet are also discussed. This comprehensive work takes the
network novice from dream to implementation, maintenance, and
evaluation of a local area network. It covers funding sources, tips
for writing technology grants, requests for proposals from vendors,
staff inservice and student training, evaluation and assessment,
student internships, technology teams, troubleshooting equipment,
and network administration. Useful forms, simple network schematic
diagrams, a model school-board approved electronic resources
policy, a glossary of technical terms, and sample assessment tools
are included. No other book walks the library media specialist
through every step in creating a LAN. Media professionals who want
to provide networked electronic information to thestaff and
students but are not sure of how to proceed will benefit from this
clear, nontechnical guide to the process.
The Web is notoriously unreliable, yet it is the first place many
students look for information. How can students, teachers, parents,
and librarians be certain that the information a Web site provides
is accurate and age appropriate? In this unique book, experienced
science educator Judith A. Bazler reviews hundreds of the most
reliable earth science-related Web sites. Each review discusses the
most appropriate grade level of the site, analyzes its accuracy and
usefulness, and provides helpful hints for getting the most out of
the resource. Sites are organized by topic, from "Air Movements" to
"Wetlands," making it easy to locate the most useful sites. A handy
summary presents the best places on the Web to find information on
science museums, science centers, careers in the earth sciences,
and supplies.
This book provides a thorough overview of the Wisdom Web of Things
(W2T), a holistic framework for computing and intelligence in an
emerging hyper-world with a social-cyber-physical space.
Fast-evolving Web intelligence research and development initiatives
are now moving toward understanding the multifaceted nature of
intelligence and incorporating it at the Web scale in a ubiquitous
environment with data, connection and service explosion. The book
focuses on the framework and methodology of W2T, as well as its
applications in different problem domains, such as intelligent
businesses, urban computing, social computing, brain informatics
and healthcare. From the researcher and developer perspectives, the
book takes a systematic, structured view of various W2T facets and
their overall contribution to the development of W2T as a whole.
Written by leading international researchers, this book is an
essential reference for researchers, educators, professionals, and
tertiary HDR students working on the World Wide Web, ubiquitous
computing, knowledge management, and business intelligence.
This book uses motivating examples and real-life attack scenarios
to introduce readers to the general concept of fault attacks in
cryptography. It offers insights into how the fault tolerance
theories developed in the book can actually be implemented, with a
particular focus on a wide spectrum of fault models and practical
fault injection techniques, ranging from simple, low-cost
techniques to high-end equipment-based methods. It then
individually examines fault attack vulnerabilities in symmetric,
asymmetric and authenticated encryption systems. This is followed
by extensive coverage of countermeasure techniques and fault
tolerant architectures that attempt to thwart such vulnerabilities.
Lastly, it presents a case study of a comprehensive FPGA-based
fault tolerant architecture for AES-128, which brings together of a
number of the fault tolerance techniques presented. It concludes
with a discussion on how fault tolerance can be combined with side
channel security to achieve protection against implementation-based
attacks. The text is supported by illustrative diagrams,
algorithms, tables and diagrams presenting real-world experimental
results.
This book introduces the development of self-interference
(SI)-cancellation techniques for full-duplex wireless communication
systems. The authors rely on estimation theory and signal
processing to develop SI-cancellation algorithms by generating an
estimate of the received SI and subtracting it from the received
signal. The authors also cover two new SI-cancellation methods
using the new concept of active signal injection (ASI) for
full-duplex MIMO-OFDM systems. The ASI approach adds an appropriate
cancelling signal to each transmitted signal such that the combined
signals from transmit antennas attenuate the SI at the receive
antennas. The authors illustrate that the SI-pre-cancelling signal
does not affect the data-bearing signal. This book is for
researchers and professionals working in wireless communications
and engineers willing to understand the challenges of deploying
full-duplex and practical solutions to implement a full-duplex
system. Advanced-level students in electrical engineering and
computer science studying wireless communications will also find
this book useful as a secondary textbook.
As blogs have evolved over the last few years, they have begun to
take on distinct characteristics depending on audience and purpose.
Though political blogs remain the most high profile (and most
read), other types of blogs are gaining in strength and visibility.
This book-a follow-up volume to Barlow's Rise of the Blogosphere,
which examined the historical context for the modern blog-provides
an examination of the many current aspects of the blogosphere, from
the political to the professional to the personal, with many stops
in between. Given that millions of blogs have been created over the
past five years and yet more come online at an undiminished rate,
and given that enthusiasm for both reading them and writing them
has yet to wane, it is likely that the blog explosion will continue
indefinitely. As blogs have evolved over the last few years, they
have begun to take on distinct characteristics depending on
audience and purpose. Though political blogs remain the most high
profile (and most read), other types of blogs are gaining in
strength and visibility. This book-a follow-up volume to Barlow's
Rise of the Blogosphere, which examined the historical context for
the modern blog-provides an examination of the many current aspects
of the blogosphere, from the political to the professional to the
personal, with many stops in between. Areas covered include the
personal blog; the political blog; the use of blogs by various
religious communities both for discussion within communities and
for outreach; the growth of blogs dedicated to specific geographic
communities, and their relations with older local media; blogs
dedicated to technical subjects, particularly relating to
computers; blogs and business; blogs sparked by video games,
movies, music, and other forms of entertainment; and more. Given
that millions of blogs have been created over the past five years
and yet more come online at an undiminished rate, and given that
enthusiasm for both reading them and writing for them has yet to
wane, it is likely that the blog explosion will continue
indefinitely.
|
|