![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This book constitutes the refereed proceedings of the 13th International Conference on Engineering Applications of Neural Networks, EANN 2012, held in London, UK, in September 2012. The 49 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers describe the applications of neural networks and other computational intelligence approaches to intelligent transport, environmental engineering, computer security, civil engineering, financial forecasting, virtual learning environments, language interpretation, bioinformatics and general engineering.
This book constitutes the thoroughly refereed proceedings of the 10th International Symposium on Automated Technology for Verification and Analysis, ATVA 2012, held at Thiruvananthapuram, Kerala, India, in October 2012. The 25 regular papers, 3 invited papers and 4 tool papers presented were carefully selected from numerous submissions. Conference papers are organized in 9 technical sessions, covering the topics of automata theory, logics and proofs, model checking, software verification, synthesis, verification and parallelism, probabilistic verification, constraint solving and applications, and probabilistic systems.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Wireless Internet, WICON 2013, held in Shanghai, China, in April 2012. The 20 revised full papers were carefully reviewed and selected from numerous submissions. The papers cover topics such as vehicular communications and heterogeneous networks, cognitive radio and multi-antenna systems, networks and beyond, ad hoc and mesh networks.
This book constitutes the refereed proceedings of the Third International Conference on Simulation, Modeling, and Programming for Autonomous Robots, SIMPAR 2012, held in Tsukuba, Japan, in November 2012. The 33 revised full papers and presented together with 3 invited talks were carefully reviewed and selected from 46 submissions. Ten papers describe design of complex behaviors of autonomous robots, 9 address software layers, 8 papers refer to related modeling and learning. The papers are organized in topical sections on mobile robots, software modeling and architecture and humanoid and biped robots.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Bio-Inspired Models of Network, Information, and Computing Systems (Bionetics). The event took place in the city of York, UK, in December 2011. Bionetics main objective is to bring bio-inspired paradigms into computer engineering and networking, and to enhance the fruitful interactions between these fields and biology. The papers of the conference were accepted in 2 categories: full papers and work-in progress. Full papers describe significant advances in the Bionetics field, while work-in-progress papers present an opportunity to discuss breaking research which is currently being evaluated. The topics are ranging from robotic coordination to attack detection in peer-to-peer networks, biological mechanisms including evolution, flocking and artificial immune systems, and nano-scale communication and networking.
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014
This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2011, held in Fort Collins, CO, USA, in September 2011. The 19 revised full papers presented and 19 poster papers were carefully reviewed and selected from 52 submissions. The scope of the workshop spans the theoretical and practical aspects of parallel and high-performance computing, and targets parallel platforms including concurrent, multithreaded, multicore, accelerator, multiprocessor, and cluster systems.
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2012, held in Brno, Czech Republic, in September 2012. The 46 revised full papers were carefully selected from 81 submissions and deal with image analysis and computer vision with a focus on detection, recognition, tracking and identification.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Joint Conference on Advances in Signal Processing and Information Technology (SPIT 2011) and Recent Trends in Information Processing and Computing (IPC 2011) held in Amsterdam, The Netherlands, in December 2011. The 50 revised full papers presented were carefully selected from 298 submissions. Conference papers promote research and development activities in computer science, information technology, computational engineering, image and signal processing, and communication.
This book constitutes the refereed proceedings of the 18th EUNICE 2012 conference on information and communication technologies, held in Budapest, in August 2012. The 23 oral papers demostrated together with 15 poster presentations were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on radio communications, security, management, protocols and performance, algorithms, models, and simulations.
This book constitutes the thoroughly refereed conference proceedings of the Third International Conference on Algorithmic Decision Theory, ADT 2013, held in November 2013 in Bruxelles, Belgium. The 33 revised full papers presented were carefully selected from more than 70 submissions, covering preferences in reasoning and decision making, uncertainty and robustness in decision making, multi-criteria decision analysis and optimization, collective decision making, learning and knowledge extraction for decision support.
This book constitutes the proceedings of the 27th International Symposium on Distributed Computing, DISC 2013, held in Jerusalem, Israel, in October 2013. The 27 full papers presented in this volume were carefully reviewed and selected from 142 submissions; 16 brief announcements are also included. The papers are organized in topical sections named: graph distributed algorithms; topology, leader election, and spanning trees; software transactional memory; shared memory executions; shared memory and storage; gossip and rumor; shared memory tasks and data structures; routing; radio networks and the SINR model; crypto, trust, and influence; and networking.
This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas.
With the continuing success of Local Area Networks (IANs), there is an increasing demand to extend their capabilities towards higher data rates and wider areas. This, together with the progress in fiber-optic technology, has given rise to the so-called Metropolitan Area Networks (MANs). MANs can span much greater distances than current LAN s, and offer data rates on the order of hundreds of Megabits/sec (Mbps). The success of MANs is mainly due to the opportunity they provide to develop new networking products capable of providing high-speed commu nications between applications at competitive prices, which nonetheless give an adequate return on the manufacturers' investments. A major factor in of appropriate networking standards. achieving this goal is the availability Fiber Distributed Data Interface (FDDl) and Distributed Queue Dual Bus (DQDB) are the two standard technologies for MANs for which industrial products are already available. For this reason, this book focuses mainly on these two standards. Nowadays there are several books dealing with MANs, and these look mainly at FDDI (e.g., [2], [92], [118], [141]). These books focus primarily on the architectures and protocols, whereas they pay little attention to per formance analysis. Due to the capability of MANs to integrate services, a quantitative analysis of the Quality of Service (QoS) provided by these tech nologies is a relevant issue, and is thus covered in depth in this book.
This book constitutes the thoroughly refereed proceedings of the 18th International Conference, Euro-Par 2012, held in Rhodes Islands, Greece, in August 2012. The 75 revised full papers presented were carefully reviewed and selected from 228 submissions. The papers are organized in topical sections on support tools and environments; performance prediction and evaluation; scheduling and load balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer to peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance network and communication; mobile and ubiquitous computing; high performance and scientific applications; GPU and accelerators computing.
"Future Internet" is a worldwide hot topic. The Internet has become a critical infrastructure for business development and social interactions. However, the immense growth of the Internet has resulted in additional stresses on its architecture, resulting in a network difficult to monitor, understand, and manage due to its huge scale in terms of connected devices and actors (end users, content providers, equipment vendors, etc). This book presents and discusses the ongoing initiatives and experimental facilities for the creation of new Future Internet Architectures using alternative approaches like Clean Slate and Incremental improvements: It considers several possible internet network use scenarios that include seamless mobility, ad hoc networks, sensor networks, internet of things and new paradigms like content and user centric networks.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC, USA, in March 2012. The 24 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 89 initial submissions. The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes of operation, new tools for cryptanalysis, new designs and Keccak.
This book constitutes the refereed proceedings of the Third International Conference on Information Technology in Bio- and Medical Informatics, ITBAM 2012, held in Vienna, Austria, September 2012, in conjunction with DEXA 2012. The 12 revised long papers and 3 revised short papers presented were carefully reviewed and selected from numerous submissions. The papers address the following topics: medical data mining and information retrieval; metadata models, prediction and mobile applications; systems biology and data mining in bioinformatics. The papers show how broad the spectrum of topics in applications of information technology to biomedical engineering and medical informatics is.
Like the 120 volt standard for electricity, the appearance of standards in network management heralds new opportunities for creativity and achievement. As one example, within the framework of these evolving standards, consider a system of local area networks connecting computing equipment from different vendors. A bridge 1qc. k:8 up because of a transient caused by a repeater failure. The result is a massive disconnecHon of virtual circuits. What is the role of the manager and the network management system in solving the problem? How does the vendor implement the solution? How does the user use it? What measurements should be made? How should they be displayed? How much of the diagnosis and correction should be automated? How does the solution change with different hardware and software? In the IEEE Communications Magazine, I recently reported a timely illustration in the area of problems in fault management. At the workshop hotel, "I was waiting for a room assignment at the reception desk, when my attendant left the counter for a moment. Upon returning, he took one look at his screen and whined an accusatory question at everyone in sight, 'Who logged out my terminal?' Who indeed! It wasn't any of us. It was the system.
This book constitutes the refereed proceedings of the Joint International Conference on Electronic Government and the Information Systems Perspective, and Electronic Democracy, EGOVIS/EDEM 2012, held in Vienna, Austria, in September 2012, in conjunction with DEXA 2012. The 27 revised full papers presented were carefully reviewed and selected from numerous submissions. They cover topics from recent research fields such as open data, cloud applications, interoperability and e-government architectures, Web 2.0 and Web 3.0 solutions and public dialogies. The papers are organized in the following topical sections: e-government country studies; e-government processes; identy management in e-government; e-government: process management; e-participation; social networks; and open data.
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2012. The 18 revised full papers presented together with 12 presentations of EU projects were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: Web security; secure management processes and procedures; access control; intrusion detection - trust; applied cryptography; secure services, databases, and data warehouses; and presentations of EU projects.
This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with all areas of critical infrastructure protection research.
Sensor networks comprise of a number of sensors installed across a spatially distributed network, which gather information and periodically feed a central server with the measured data. The server monitors the data, issues possible alarms and computes fast aggregates. As data analysis requests may concern both present and past data, the server is forced to store the entire stream. But the limited storage capacity of a server may reduce the amount of data stored on the disk. One solution is to compute summaries of the data as it arrives, and to use these summaries to interpolate the real data. This work introduces a recently defined spatio-temporal pattern, called trend cluster, to summarize, interpolate and identify anomalies in a sensor network. As an example, the application of trend cluster discovery to monitor the efficiency of photovoltaic power plants is discussed. The work closes with remarks on new possibilities for surveillance enabled by recent developments in sensing technology.
This book includes the thoroughly refereed post-conference proceedings of the 15th Annual RoboCup International Symposium, held in Istanbul, Turkey, in July 2011. The 12 revised papers and 32 poster presentation presented were carefully reviewed and selected from 97 submissions. The papers are orginazed on topical sections on robot hardware and software, perception and action, robotic cognition and learning, multi-robot systems, human-robot interaction, education and edutainment and applications. |
You may like...
Radio Frequency and Microwave Power…
Andrei Grebennikov
Hardcover
Beyond-CMOS Technologies for Next…
Rasit O. Topaloglu, H.S. Philip Wong
Hardcover
R3,131
Discovery Miles 31 310
A Computer-Aided Design and Synthesis…
Geert Van Der Plas, Georges Gielen, …
Hardcover
R4,132
Discovery Miles 41 320
RF / Microwave Circuit Design for…
Ulrich L. Rohde, Matthias Rudolph
Hardcover
R4,952
Discovery Miles 49 520
Design and Modeling of Low Power VLSI…
Manoj Sharma, Ruchi Gautam, …
Hardcover
R5,208
Discovery Miles 52 080
Handbook of VLSI Microlithography…
William B. Glendinning, John N. Helbert
Hardcover
R1,238
Discovery Miles 12 380
|