![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This book constitutes the refereed proceedings of the First International Conference on Applied Algorithms, ICAA 2014, held in Kolkata, India, in January 2014. ICAA is a new conference series with a mission to provide a quality forum for researchers working in applied algorithms. Papers presenting original contributions related to the design, analysis, implementation and experimental evaluation of efficient algorithms and data structures for problems with relevant real-world applications were sought, ideally bridging the gap between academia and industry. The 21 revised full papers presented together with 7 short papers were carefully reviewed and selected from 122 submissions.
Grids, P2P and Services Computing, the 12th volume of the CoreGRID series, is based on the CoreGrid ERCIM Working Group Workshop on Grids, P2P and Service Computing in Conjunction with EuroPar 2009. The workshop will take place August 24th, 2009 in Delft, The Netherlands. Grids, P2P and Services Computing, an edited volume contributed by well-established researchers worldwide, will focus on solving research challenges for Grid and P2P technologies. Topics of interest include: Service Level Agreement, Data & Knowledge Management, Scheduling, Trust and Security, Network Monitoring and more. Grids are a crucial enabling technology for scientific and industrial development. This book also includes new challenges related to service-oriented infrastructures. Grids, P2P and Services Computing is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.
This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Networking, ICDCN 2014, held in Coimbatore, India, in January 2014. The 32 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical sections named: mutual exclusion, agreement and consensus; parallel and multi-core computing; distributed algorithms; transactional memory; P2P and distributed networks; resource sharing and scheduling; cellular and cognitive radio networks and backbone networks.
This two volume set LNCS 8285 and 8286 constitutes the proceedings of the 13th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2013, held in Vietri sul Mare, Italy in December 2013. The first volume contains 10 distinguished and 31 regular papers selected from 90 submissions and covering topics such as big data, multi-core programming and software tools, distributed scheduling and load balancing, high-performance scientific computing, parallel algorithms, parallel architectures, scalable and distributed databases, dependability in distributed and parallel systems, wireless and mobile computing. The second volume consists of four sections including 35 papers from one symposium and three workshops held in conjunction with ICA3PP 2013 main conference. These are 13 papers from the 2013 International Symposium on Advances of Distributed and Parallel Computing (ADPC 2013), 5 papers of the International Workshop on Big Data Computing (BDC 2013), 10 papers of the International Workshop on Trusted Information in Big Data (TIBiDa 2013) as well as 7 papers belonging to Workshop on Cloud-assisted Smart Cyber-Physical Systems (C-Smart CPS 2013).
The two-volume set LNCS 8297 and LNCS 8298 constitutes the proceedings of the 4th International Conference on Swarm, Evolutionary and Memetic Computing, SEMCCO 2013, held in Chennai, India, in December 2013. The total of 123 papers presented in this volume set was carefully reviewed and selected for inclusion in the proceedings. They cover cutting-edge research on swarm, evolutionary and memetic computing, neural and fuzzy computing and its application.
This book constitutes the refereed post-proceedings of the 10th International Symposium on Advanced Parallel Processing Technologies, APPT 2013, held in Stockholm, Sweden, in August 2013. The 30 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers cover a wide range of topics capturing some of the state of the art and practice in parallel architecture, parallel software, concurrent and distributed systems, and cloud computing, with a highlight on computing systems for big data applications.
This brief presents a peer-to-peer (P2P) web-hosting infrastructure (named pWeb) that can transform networked, home-entertainment devices into lightweight collaborating Web servers for persistently storing and serving multimedia and web content. The issues addressed include ensuring content availability, Plexus routing and indexing, naming schemes, web ID, collaborative web search, network architecture and content indexing. In pWeb, user-generated voluminous multimedia content is proactively uploaded to a nearby network location (preferably within the same LAN or at least, within the same ISP) and a structured P2P mechanism ensures Internet accessibility by tracking the original content and its replicas. This new paradigm of information management strives to provide low or no-cost cloud storage and entices the end users to upload voluminous multimedia content to the cloud data centers. However, it leads to difficulties in privacy, network architecture and content availability. Concise and practical, this brief examines the benefits and pitfalls of the pWeb web-hosting infrastructure. It is designed for professionals and practitioners working on P2P and web management and is also a useful resource for advanced-level students studying networks or multimedia.
This two volume set LNCS 8285 and 8286 constitutes the proceedings of the 13th International Conference on Algorithms and Architectures for Parallel Processing , ICA3PP 2013, held in Vietri sul Mare, Italy in December 2013. The first volume contains 10 distinguished and 31 regular papers selected from 90 submissions and covering topics such as big data, multi-core programming and software tools, distributed scheduling and load balancing, high-performance scientific computing, parallel algorithms, parallel architectures, scalable and distributed databases, dependability in distributed and parallel systems, wireless and mobile computing. The second volume consists of four sections including 35 papers from one symposium and three workshops held in conjunction with ICA3PP 2013 main conference. These are 13 papers from the 2013 International Symposium on Advances of Distributed and Parallel Computing (ADPC 2013), 5 papers of the International Workshop on Big Data Computing (BDC 2013), 10 papers of the International Workshop on Trusted Information in Big Data (TIBiDa 2013) as well as 7 papers belonging to Workshop on Cloud-assisted Smart Cyber-Physical Systems (C-Smart CPS 2013).
This two volume set LNCS 8630 and 8631 constitutes the proceedings of the 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014, held in Dalian, China, in August 2014. The 70 revised papers presented in the two volumes were selected from 285 submissions. The first volume comprises selected papers of the main conference and papers of the 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014, the 5th International Workshop on Intelligent Communication Networks, IntelNet 2014, and the 5th International Workshop on Wireless Networks and Multimedia, WNM 2014. The second volume comprises selected papers of the main conference and papers of the Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014, and the Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014.
Congestion Control in Data Transmission Networks details the modeling and control of data traffic in communication networks. It shows how various networking phenomena can be represented in a consistent mathematical framework suitable for rigorous formal analysis. The monograph differentiates between fluid-flow continuous-time traffic models, discrete-time processes with constant sampling rates, and sampled-data systems with variable discretization periods. The authors address a number of difficult real-life problems, such as: optimal control of flows with disparate, time-varying delay; the existence of source and channel nonlinearities; the balancing of quality of service and fairness requirements; and the incorporation of variable rate allocation policies. Appropriate control mechanisms which can handle congestion and guarantee high throughput in various traffic scenarios (with different networking phenomena being considered) are proposed. Systematic design procedures using sound control-theoretic foundations are adopted. Since robustness issues are of major concern in providing efficient data-flow regulation in today's networks, sliding-mode control is selected as the principal technique to be applied in creating the control solutions. The controller derivation is given extensive analytical treatment and is supported with numerous realistic simulations. A comparison with existing solutions is also provided. The concepts applied are discussed in a number of illustrative examples, and supported by many figures, tables, and graphs walking the reader through the ideas and introducing their relevance in real networks. Academic researchers and graduate students working in computer networks and telecommunications and in control (especially time-delay systems and discrete-time optimal and sliding-mode control) will find this text a valuable assistance in ensuring smooth data-flow within communications networks.
This book constitutes the proceedings of the 13th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 60 paper presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: algorithms; biometrics and biometrics applications; data analysis and information retrieval; industrial management and other applications; modelling and optimization; networking; pattern recognition and image processing; and various aspects of computer security.
Soft computing, as opposed to conventional "hard" computing, tolerates imprecision and uncertainty, in a way very much similar to the human mind. Soft computing techniques include neural networks, evolutionary computation, fuzzy logic, and chaos. The recent years have witnessed tremendous success of these powerful methods in virtually all areas of science and technology, as evidenced by the large numbers of research results published in a variety of journals, conferences, as weil as many excellent books in this book series on Studies in Fuzziness and Soft Computing. This volume is dedicated to recent novel applications of soft computing in communications. The book is organized in four Parts, i.e., (1) neural networks, (2) evolutionary computation, (3) fuzzy logic and neurofuzzy systems, and (4) kernel methods. Artificial neural networks consist of simple processing elements called neurons, which are connected by weights that may be adjusted during learning. Part 1 of the book has seven chapters, demonstrating some of the capabilities of two major types of neural networks, i.e., multiplayer perceptron (MLP) neural networks and Hopfield-type neural networks.
This book constitutes the refereed proceedings of the 6th International Workshop on Multiple Access Communications, MACOM 2013, held in Vilnius, Lithuania, in December 2013. The 16 full papers presented were carefully reviewed and selected from various submissions. They describe the latest advancements in the field of multiple access communications with an emphasis on OFDM techniques, channel coding, spectrum management, medium access control protocols and different aspects of wireless access networks.
Semantic Web Services for Web Databases introduces an end-to-end framework for querying Web databases using novel Web service querying techniques. This includes a detailed framework for the query infrastructure for Web databases and services. Case studies are covered in the last section of this book. Semantic Web Services For Web Databases is designed for practitioners and researchers focused on service-oriented computing and Web databases.
This book constitutes the refereed proceedings of the 11th International Conference on Service-Oriented Computing, ICSOC 2012, held in Berlin, Germany, in December 2013. The 29 full papers and 27 short papers presented were carefully reviewed and selected from 205 submissions. The papers are organized in topical sections on service engineering, service operations and management; services in the cloud; and service applications and implementations.
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 14th International Middleware Conference, held in Beijing, China, in December 2013. The 24 revised full papers presented were carefully reviewed and selected from 189 submissions. The papers cover a wide range of topics including design, implementation, deployment and evaluation of middleware for next-generation platforms such as cloud computing, social networks and large-scale storage and distributed systems. The middleware solutions introduced provide features such as availability, efficiency, scalability, fault-tolerance, trustworthy operation and support security and privacy needs.
This book constitutes the thoroughly refereed conference proceedings of the 9th International Conference on Web and Internet Economics, WINE 2013, held in Cambridge, MA, USA, in December 2013. The 36 revised full papers were carefully reviewed and selected from 150 submissions and cover research in theoretical computer science, artificial intelligence and microeconomics.
This book constitutes the refereed proceedings of the 6th bi-annual Latin American Conference on Human-Computer Interaction, CLIHC 2013, held in Guanacasta, Costa Rica, in December 2013. The 11 full papers and 14 short papers were carefully reviewed and selected from 32 submissions. The papers address all current topics in HCI such as: cultural issues, assistive technologies, usability, accessibility, multimodal inter-faces, design issues, HCI education, and visualization and evaluation techniques, among others.
Evolutionary Algorithms (EA) are powerful search and optimisation techniques inspired by the mechanisms of natural evolution. They imitate, on an abstract level, biological principles such as a population based approach, the inheritance of information, the variation of information via crossover/mutation, and the selection of individuals based on fitness. The most well-known class of EA are Genetic Algorithms (GA), which have received much attention not only in the scientific community lately. Other variants of EA, in particular Genetic Programming, Evolution Strategies, and Evolutionary Programming are less popular, though very powerful too. Traditionally, most practical applications of EA have appeared in the technical sector. Management problems, for a long time, have been a rather neglected field of EA-research. This is surprising, since the great potential of evolutionary approaches for the business and economics domain was recognised in pioneering publications quite a while ago. John Holland, for instance, in his seminal book Adaptation in Natural and Artificial Systems (The University of Michigan Press, 1975) identified economics as one of the prime targets for a theory of adaptation, as formalised in his reproductive plans (later called Genetic Algorithms).
In the last few years, a stimulating idea is fast emergingin the wireless scenario: the pervasive presence around us of a variety of "things" or "objects", such as RFID, sensors, actuators, mobile phones, which, through unique addressing schemes, are able to interact with each other and cooperate with their neighboring "smart" c- ponents to reach common goals. This novel paradigm, named "The Internet of Things" (IoT) continues on the path set by the concept of smart environments and paves the way to the depl- ment of numerous applications with a signi cant impact on many elds of future every-day life. In this context, logistics, Intelligent Transportation Systems (ITS), business/process management,assisted living, and e-health are only a few examples of possible application elds in which this novel paradigm will play a leading role in the next future. Actually,manychallengingissues still needto be addressedand both technolo- calandsocialnodesuntiedbeforethe IoTideabeingwidelyaccepted.Centralissues are making a full interoperabilityof such devices possible, enablingtheir adaptation and autonomousbehavior, as well as guaranteeingtrust, privacy,and security. Also, the IoT idea poses several new problemsconcerningthe networkingaspects. In fact, the "things" composing the IoT will be characterized by low resources in terms of both computation and energy capacity. Accordingly, the proposed solutions need to payspecial attentionto resourceef ciencybesides the obviousscalability problems. The papers included in this volume present a picture of the current state of the art on the above issues; more speci cally, concepts and ideas are discussed on n- working, middleware, security and privacy, RFID and sensor networks, as well as electromagnetic aspects.
This book constitutes the refereed proceedings of the 8th International Conference on Scalable Uncertainty Management, SUM 2014, held in Oxford, UK, in September 2014. The 20 revised full papers and 6 revised short papers were carefully reviewed and selected from 47 submissions. The papers cover topics in all areas of managing and reasoning with substantial and complex kinds of uncertain, incomplete or inconsistent information including applications in decision support systems, machine learning, negotiation technologies, semantic web applications, search engines, ontology systems, information retrieval, natural language processing, information extraction, image recognition, vision systems, data and text mining, and the consideration of issues such as provenance, trust, heterogeneity, and complexity of data and knowledge.
This book constitutes the thoroughly refereed, selected papers on Cyber Security and Privacy EU Forum 2013, held in Belgium, in April 2013. The 14 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on cloud computing, security and privacy management, security and privacy technology, security and privacy policy.
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.
This book constitutes the thoroughly refereed post conference proceedings of the Third International Conference on Cloud Computing, Cloud Comp 2012, held in Vienna, Austria, in September 2012. The 14 revised full papers were carefully reviewed and selected from numerous submissions and cover various topics in the application of cloud computing technologies.
ISGC 2009, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan in April 2009 bringing together prestigious scientists and engineers worldwide to exchange ideas, present challenges/solutions and introduce future development in the field of Grid Computing. Managed Grids and Cloud Systems in the Asia-Pacific Research Community presents the latest achievements in grid technology including Cloud Computing. This volume also covers international projects in Grid Operation, Grid Middleware, E-Science applications, technical developments in grid operations and management, Security and Networking, Digital Library and more. The resources used to support these advances, such as volunteer grids, production managed grids, and cloud systems are discussed in detail. This book is designed for a professional audience composed of grid users, developers and researchers working in the grid computing. Advanced-level students focusing on computer science and engineering will find this book valuable as a reference or secondary text book. |
![]() ![]() You may like...
Cellular Internet of Things - From…
Olof Liberg, Marten Sundberg, …
Paperback
R2,551
Discovery Miles 25 510
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
Engineering Vibration Analysis - Worked…
Valery A. Svetlitsky
Hardcover
R3,014
Discovery Miles 30 140
Evolution of Spontaneous Structures in…
Friedrich H. Busse, Stefan C. Muller
Hardcover
R3,223
Discovery Miles 32 230
Introduction to Data Systems - Building…
Thomas Bressoud, David White
Hardcover
R2,423
Discovery Miles 24 230
|