![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This two volume set LNCS 8285 and 8286 constitutes the proceedings of the 13th International Conference on Algorithms and Architectures for Parallel Processing , ICA3PP 2013, held in Vietri sul Mare, Italy in December 2013. The first volume contains 10 distinguished and 31 regular papers selected from 90 submissions and covering topics such as big data, multi-core programming and software tools, distributed scheduling and load balancing, high-performance scientific computing, parallel algorithms, parallel architectures, scalable and distributed databases, dependability in distributed and parallel systems, wireless and mobile computing. The second volume consists of four sections including 35 papers from one symposium and three workshops held in conjunction with ICA3PP 2013 main conference. These are 13 papers from the 2013 International Symposium on Advances of Distributed and Parallel Computing (ADPC 2013), 5 papers of the International Workshop on Big Data Computing (BDC 2013), 10 papers of the International Workshop on Trusted Information in Big Data (TIBiDa 2013) as well as 7 papers belonging to Workshop on Cloud-assisted Smart Cyber-Physical Systems (C-Smart CPS 2013).
This book constitutes the refereed proceedings of the Second CCF Internet Conference of China, ICoC 2013, held in Zhangjiajie, China, in July 2013. The 24 revised full papers presented were carefully reviewed and selected from 63 submissions. The papers address issues such as future Internet architecture, Internet routing, network security, network management, data center networks, green networks, wireless networks, P2P networks, mobile Internet and the Internet of Things.
This two-volume set of CCIS 391 and CCIS 392 constitutes the refereed proceedings of the Fourth International Conference on Information Computing and Applications, ICICA 2013, held in Singapore, in August 2013. The 126 revised full papers presented in both volumes were carefully reviewed and selected from 665 submissions. The papers are organized in topical sections on Internet computing and applications; engineering management and applications; intelligent computing and applications; control engineering and applications; cloud and evolutionary computing; knowledge management and applications; computational statistics and applications.
Soft computing, as opposed to conventional "hard" computing, tolerates imprecision and uncertainty, in a way very much similar to the human mind. Soft computing techniques include neural networks, evolutionary computation, fuzzy logic, and chaos. The recent years have witnessed tremendous success of these powerful methods in virtually all areas of science and technology, as evidenced by the large numbers of research results published in a variety of journals, conferences, as weil as many excellent books in this book series on Studies in Fuzziness and Soft Computing. This volume is dedicated to recent novel applications of soft computing in communications. The book is organized in four Parts, i.e., (1) neural networks, (2) evolutionary computation, (3) fuzzy logic and neurofuzzy systems, and (4) kernel methods. Artificial neural networks consist of simple processing elements called neurons, which are connected by weights that may be adjusted during learning. Part 1 of the book has seven chapters, demonstrating some of the capabilities of two major types of neural networks, i.e., multiplayer perceptron (MLP) neural networks and Hopfield-type neural networks.
One of the first books in the timely and important area of heavy traffic analysis of controlled and uncontrolled stochastics networks, by one of the leading authors in the field. The general theory is developed, with possibly state dependent parameters, and specialized to many different cases of practical interest.
'There is no doubt', dr. Kevin Nunley wrote, 'the Internet really is the biggest gold rush of our lifetime. It is unlikely you or I will get another chance as big as this one to earn huge profits anytime in the next 100 years. Someday people will look back and judge us as one of two groups: those who didn't recognize the Internet revolution and missed the greatest chance of our age, and those who smartly made a place for themselves in the new business model that will dominate the future. It is time to get on board. ' Ing. Adrian Mulder Content Editor Adrian Mulder is an Internet journalist who writes for major business computing magazines. He combines a technical background with a vast experience in the computer and business trade magazine industry The Ultimate Internet Advertising Guide Acknowledgements Many people and professionals have contributed directly or indirectly to this book. To name them all would be practically impossible, as there are many. Nevertheless the editors would like to mention a few of those who have made the production of this book possible. Executive Editor for SCN Education BV: Robert Pieter Schotema Publishing Manager: drs. Marieke Kok Marketing Coordinator: Martijn Robert Broersma Content Editor: ing. Adrian Mulder Editorial Support Dennis Gaasbeek, Rob Guijt, Richard van Winssen Interior Design: Paulien van Hemmen, Bach. Also, we would especially like to thank dr. Roland van Stigt for laying a solid foundation for the Hon Guide series to grow on.
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 14th International Middleware Conference, held in Beijing, China, in December 2013. The 24 revised full papers presented were carefully reviewed and selected from 189 submissions. The papers cover a wide range of topics including design, implementation, deployment and evaluation of middleware for next-generation platforms such as cloud computing, social networks and large-scale storage and distributed systems. The middleware solutions introduced provide features such as availability, efficiency, scalability, fault-tolerance, trustworthy operation and support security and privacy needs.
This book constitutes the refereed proceedings of the 6th bi-annual Latin American Conference on Human-Computer Interaction, CLIHC 2013, held in Guanacasta, Costa Rica, in December 2013. The 11 full papers and 14 short papers were carefully reviewed and selected from 32 submissions. The papers address all current topics in HCI such as: cultural issues, assistive technologies, usability, accessibility, multimodal inter-faces, design issues, HCI education, and visualization and evaluation techniques, among others.
This book constitutes the thoroughly refereed conference proceedings of the 9th International Conference on Web and Internet Economics, WINE 2013, held in Cambridge, MA, USA, in December 2013. The 36 revised full papers were carefully reviewed and selected from 150 submissions and cover research in theoretical computer science, artificial intelligence and microeconomics.
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.
This book constitutes the thoroughly refereed post conference proceedings of the Third International Conference on Cloud Computing, Cloud Comp 2012, held in Vienna, Austria, in September 2012. The 14 revised full papers were carefully reviewed and selected from numerous submissions and cover various topics in the application of cloud computing technologies.
This book constitutes the refereed conference proceedings of the 10th International Conference on Advances in Computer Entertainment, ACE 2013, held in Boekelo, The Netherlands, in November 2013. The 19 full paper and 16 short papers presented together 42 extended abstracts were carefully reviewed and selected from a total of 133 submissions in all categories. The papers cover topics across a wide spectrum of disciplines including new devices; evaluation and user studies; games as interface to serious applications; creating immersion; interfaces; new experiences; procedural approaches and AI; and theory. Focusing on all areas related to interactive entertainment they aim at stimulating discussion in the development of new and compelling entertainment computing and interactive art concepts and applications.
This book constitutes the refereed proceedings of the 9th International Haifa Verification Conference, HVC 2013, held in Haifa, Israel in November 2013. The 24 revised full papers presented were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on SAT and SMT-based verification, software testing, supporting dynamic verification, specification and coverage, abstraction and model presentation.
Johannes Buchmann is internationally recognized as one of the leading figures in areas of computational number theory, cryptography and information security. He has published numerous scientific papers and books spanning a very wide spectrum of interests; besides R&D he also fulfilled lots of administrative tasks for instance building up and directing his research group CDC at Darmstadt, but he also served as the Dean of the Department of Computer Science at TU Darmstadt and then went on to become Vice President of the university for six years (2001-2007). This festschrift, published in honor of Johannes Buchmann on the occasion of his 60th birthday, contains contributions by some of his colleagues, former students and friends. The papers give an overview of Johannes Buchmann's research interests, ranging from computational number theory and the hardness of cryptographic assumptions to more application-oriented topics such as privacy and hardware security. With this book we celebrate Johannes Buchmann's vision and achievements.
The two-volume set LNCS 8297 and LNCS 8298 constitutes the proceedings of the 4th International Conference on Swarm, Evolutionary and Memetic Computing, SEMCCO 2013, held in Chennai, India, in December 2013. The total of 123 papers presented in this volume was carefully reviewed and selected for inclusion in the proceedings. They cover cutting-edge research on swarm, evolutionary and memetic computing, neural and fuzzy computing and its application.
This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Networking, ICDCN 2014, held in Coimbatore, India, in January 2014. The 32 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical sections named: mutual exclusion, agreement and consensus; parallel and multi-core computing; distributed algorithms; transactional memory; P2P and distributed networks; resource sharing and scheduling; cellular and cognitive radio networks and backbone networks.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.
This book constitutes the refereed proceedings of the 25th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2013, held in Istanbul, Turkey, in November 2013. The 17 revised full papers presented together with 3 short papers were carefully selected from 68 submissions. The papers are organized in topical sections on model-based testing, testing timed and concurrent systems, test suite selection and effort estimation, tools and languages, and debugging.
This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2013, held in Pozna, Poland, in October 2013. The 63 revised full papers were carefully selected from 111 submissions. The topics covered are aquisition, pre-processing and coding, biometry, classification and recognition, depth, 3D and tracking, efficient implementation and frameworks, low level image analysis, segmentation and video analysis."
This book constitutes the revised selected papers of the workshops of the 10th International Conference on Mobile Web Information, MobiWIS 2013, held in Paphos, Cyprus, in August 2013. The conference hosted two workshops: the First International Workshop on Future Internet of Things and Cloud, FICloud 2013, focusing on the Internet of Things and its relation with cloud computing and the Fourth International Workshop on Service Discovery and Composition in Ubiquitous and Pervasive Environments, SUPE 2013, addressing the issues that characterize automatic service composition in ubiquitous and pervasive computing. The 14 papers presented were carefully reviewed and selected from various submissions.
Queueing is an aspect of modern life that we encounter at every step in our daily activities. Whether it happens at the checkout counter in the supermarket or in accessing the Internet, the basic phenomenon of queueing arises whenever a shared facility needs to be accessed for service by a ]arge number of jobs or customers. The study of queueing is important as it gravides both a theoretical background to the kind of service that we may expect from such a facility and the way in which the facility itself may be designed to provide some specified grade of service to its customers. Our study of queueing was basically motivated by its use in the study of communication systems and computer networks. The various computers, routers and switches in such a network may be modelled as individual queues. The whole system may itself be modelled as a queueing network providing the required service to the messages, packets or cells that need to be carried. Application of queueing theory provides the theoretical framework for the design and study of such networks. The purpose of this book is to support a course on queueing systems at the senior undergraduate or graduate Ievels. Such a course would then provide the theoretical background on which a subsequent course on the performance modeHing and analysis of computer networks may be based.
The International PROLAMAT Conference is an internationally well known event for demonstrating and evaluating activities and progress in the field of discrete manufacturing. Sponsored by the International Federation for Information Processing (IFIP), the PROLAMAT is traditionally held every three years and it includes the whole area of advanced software technology for Design and Manufacturing in Discrete Manufacturing. Past editions of the International PROLAMA T Conference have explored: -Manufacturing Technology, -Advances in CAD/CAM, -Software for Discrete Manufacturing, -Software for Manufacturing. The Eight International PROLAMAT held in 1992 (Tokyo), focused on the theme of Man in CIM. The 1995 PROLAMAT (Berlin), featured the theme of Life Cycle Modelling for Innovative Products and Processes. This past emphasis on human aspects and innovation provides a strong foundation for the next PROLAMAT. Under the title: The globalization of manufacturing in the digital communications era of the 21th century: innovation, agility and the virtual enterprise, the 1998 conference expands the PROLAMAT scope to include teams and virtual enterprises which come together across space and time to develop new products and bring them to global markets. Manufacturing issues and information models have long been part of concurrent engineering; they are increasingly important in new product innovation and in the development of manufacturing plans and processes which span multiple companies along with multiple time zones.
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Wireless Internet, WICON 2013, held in Shanghai, China, in April 2012. The 20 revised full papers were carefully reviewed and selected from numerous submissions. The papers cover topics such as vehicular communications and heterogeneous networks, cognitive radio and multi-antenna systems, networks and beyond, ad hoc and mesh networks. |
![]() ![]() You may like...
Blockchain Cybersecurity, Trust and…
Kim-Kwang Raymond Choo, Ali Dehghantanha, …
Hardcover
R4,814
Discovery Miles 48 140
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, …
Hardcover
R3,422
Discovery Miles 34 220
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R4,130
Discovery Miles 41 300
Advances in Communication Systems and…
J. Jayakumari, George K. Karagiannidis, …
Hardcover
R5,907
Discovery Miles 59 070
Intelligent Resource Management for…
Qiang Ye, Weihua Zhuang
Hardcover
R4,132
Discovery Miles 41 320
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
|