![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.
Optical networks are leaving the labs and becoming a reality. Despite the current crisis of the telecom industry, our everyday life increasingly depends on communication networks for information exchange, medicine, education, data transfer, commerce, and many other endeavours. High capacity links are required by the large futemet traffic demand, and optical networks remain one of the most promising technologies for meeting these needs. WDM systems are today widely deployed, thanks to low-cost at extreme data rates and high reliability of optical components, such as optical amplifiers and fixed/tunable filters and transceivers. Access and metropolitan area networks are increasingly based on optical technologies to overcome the electronic bottleneck at the network edge. Traditional multi-layer architectures, such as the widely deployed IP/ATM/SDH protocol stack, are increasingly based on WDM transport; further efforts are sought to move at the optical layer more of the functionalities available today in higher protocol layers. New components and subsystems for very high speed optical networks offer new design opportunities to network operators and designers. The trends towards dynamically configurable all-optical network infrastructures open up a wide range of new network engineering and design choices, which must face issues such as interoperability and unified control and management.
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.
This book constitutes the refereed proceedings of the 7th International Conference on Scalable Uncertainty Management, SUM 2013, held in Washington, DC, USA, in September 2013. The 26 revised full papers and 3 revised short papers were carefully reviewed and selected from 57 submissions. The papers cover topics in all areas of managing and reasoning with substantial and complex kinds of uncertain, incomplete or inconsistent information including applications in decision support systems, machine learning, negotiation technologies, semantic web applications, search engines, ontology systems, information retrieval, natural language processing, information extraction, image recognition, vision systems, data and text mining, and the consideration of issues such as provenance, trust, heterogeneity, and complexity of data and knowledge.
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security and authentication.
Welcome to the fourth IFIP workshop on protocols for high speed networks in Vancouver. This workshop follows three very successful workshops held in Ziirich (1989), Palo Alto (1990) and Stockholm (1993) respectively. We received a large number of papers in response to our call for contributions. This year, forty papers were received of which sixteen were presented as full papers and four were presented as poster papers. Although we received many excellent papers the program committee decided to keep the number of full presentations low in order to accommodate more discussion in keeping with the format of a workshop. Many people have contributed to the success of this workshop including the members of the program committee who, with the additional reviewers, helped make the selection of the papers. We are thankful to all the authors of the papers that were submitted. We also thank several organizations which have contributed financially to this workshop, specially NSERC, ASI, CICSR, UBC, MPR Teltech and Newbridge Networks.
This book constitutes the proceedings of the 27th International Symposium on Distributed Computing, DISC 2013, held in Jerusalem, Israel, in October 2013. The 27 full papers presented in this volume were carefully reviewed and selected from 142 submissions; 16 brief announcements are also included. The papers are organized in topical sections named: graph distributed algorithms; topology, leader election, and spanning trees; software transactional memory; shared memory executions; shared memory and storage; gossip and rumor; shared memory tasks and data structures; routing; radio networks and the SINR model; crypto, trust, and influence; and networking.
In the telecom world, services have usually been conceived with a specific mindset. This mindset has defined the traditional characteristics of these services; services distinguished by their linkage with the access network, tight control over service use (e.g., authentication, billing), lack of deep personalization capabilities (mass services only) and reliance on standardization to achieve end-to-end interoperability between all the actors of the value chain (e.g., operators, platform manufacturers, device manufactures). This book offers insights into this complex but exciting world of telecommunications characterized by constant evolution, and approaches it from technology as well as business perspectives. The book is appropriately structured in three parts: (a) an overview of the state-of-the-art in fixed/mobile NGN and standardization activities; (b) an analysis of the competitive landscape between operators, device manufactures and OTT providers, emphasizing why network operators are challenged on their home turf; and (c) opportunities for business modeling and innovative telecom service offers.
This book constitutes the workshop proceedings of the 18th International Conference on Database Systems for Advanced Applications, DASFAA 2013, held in Wuhan, China, in April 2013. The volume contains three workshops, each focusing on specific area that contributes to the main themes of the DASFAA conference: The First International Workshop on Big Data Management and Analytics (BDMA 2013), the Third International Workshop on Social Networks and Social Web (SNSM 2013) and the International Workshop on Semantic Computing and Personalization (SeCoP 2013).
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013. The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.
This book constitutes the refereed proceedings of the 19th EUNICE/IFIP WG 6.2, 6.6 workshop on Advances in Communication Networking, EUNICE 2013, held in Chemnitz, Germany, in August 2013. The 23 oral papers demonstrated together with 9 poster presentations were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network modeling and design, traffic analysis, network and traffic management, services over mobile networks, monitoring and measurement, security concepts, application of ICT in smart grid and smart home environments, data dissemination in ad-hoc and sensor networks, and services and applications.
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications. "
This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in Gebze, Turkey, during May 6-7, 2013. The 10 full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are grouped in topical sections on efficient Implementations and designs, block cipher cryptanalysis, wireless sensor networks, and cryptographic protocols.
This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St. Lucia in October 2013. The volume contains 22 full papers that were carefully reviewed and selected from 95 submissions, as well as 10 poster papers selected from the 23 submissions. The papers address all current topics in computer security ranged from hardware-level security, server, web, mobile, and cloud-based security, malware analysis, and web and network privacy.
This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.
This book constitutes the refereed proceedings of the 19th International Conference on Parallel and Distributed Computing, Euro-Par 2013, held in Aachen, Germany, in August 2013. The 70 revised full papers presented were carefully reviewed and selected from 261 submissions. The papers are organized in 16 topical sections: support tools and environments; performance prediction and evaluation; scheduling and load balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer-to-peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance networks and communication; high performance and scientific applications; GPU and accelerator computing; and extreme-scale computing.
This brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service types, it presents several corresponding mechanisms which can ensure pricing implementation and resource allocation. The authors discuss utility optimization of network pricing methods in economics and underline two classes of pricing methods including system optimization and entities' strategic optimization. The brief closes with two examples of the newly proposed pricing strategy helping to solve the profit distribution problem brought by P2P free-riding and improve the pricing efficiency with the introduction of the price discrimination. The Internet resource pricing strategy is not only the key factor of Internet resource allocation efficiency, but also the determinant of the profit. The methods and models discussed in Internet Resource Pricing Models increase the efficiency of existing pricing strategies to ensure a sound and sustainable development of the Internet. The brief will help researchers and professionals working with this key factor of Internet resource allocation.
This book constitutes the revised selected papers of the First International Conference on Networked Systems, NETYS 2013, held in Marrakech, Morocco, in May 2013. The 33 papers (17 regular and 16 short papers) presented were carefully reviewed and selected from 74 submissions. They address major topics from theory and practice of networked systems: multi-core architectures, middleware, environments, storage clusters, as well as peer-to-peer, sensor, wireless, and mobile networks.
This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and biomedical applications; pattern recognition and image processing; various aspects of computer security, networking, algorithms, and industrial applications. The book also contains full papers of a keynote speech and the invited talk.
This book constitutes the refereed proceedings of the First International Conference on Wireless Sensor Networks for Developing Countries, WSN4DC 2013, held in Jamshoro, Pakistan, in April 2013. The 10 revised full papers presented were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on WSN applications/services for developing countries; mobile WSN; underwater WSN; VANETS; body area networks; energy harvesting in WSN; WSN and cloud integration; WSN and IoT; QoS and Qot; WSN MAC, network and transport protocols; cross layer approaches; security aspects in WSN; WSN applications in smart grid and energy management; WSN in structural health monitoring.
Complex Social Networks is a newly emerging (hot) topic with applications in a variety of domains, such as communication networks, engineering networks, social networks, and biological networks. In the last decade, there has been an explosive growth of research on complex real-world networks, a theme that is becoming pervasive in many disciplines, ranging from mathematics and computer science to the social and biological sciences. Optimization of complex communication networks requires a deep understanding of the interplay between the dynamics of the physical network and the information dynamics within the network. Although there are a few books addressing social networks or complex networks, none of them has specially focused on the optimization perspective of studying these networks. This book provides the basic theory of complex networks with several new mathematical approaches and optimization techniques to design and analyze dynamic complex networks. A wide range of applications and optimization problems derived from research areas such as cellular and molecular chemistry, operations research, brain physiology, epidemiology, and ecology.
This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisition, data storage and data analysis. For each phase, the book introduces the general background, discusses technical challenges and reviews the latest advances. Technologies under discussion include cloud computing, Internet of Things, data centers, Hadoop and more. The authors also explore several representative applications of big data such as enterprise management, online social networks, healthcare and medical applications, collective intelligence and smart grids. This book concludes with a thoughtful discussion of possible research directions and development trends in the field. Big Data: Related Technologies, Challenges and Future Prospects is a concise yet thorough examination of this exciting area. It is designed for researchers and professionals interested in big data or related research. Advanced-level students in computer science and electrical engineering will also find this book useful.
Born after World War II, large-scale experimental high-energy physics (HEP) has found itself limited ever since by available accelerator, detector and computing technologies. Accordingly, HEP has made significant contributions to the development of these fields, more often than not driving their innovations. The invention of the World Wide Web at CERN is merely the best-known example out of many. This book is the first comprehensive account to trace the history of this pioneering spirit in the field of computing technologies. It covers everything up to and including the present-day handling of the huge demands imposed upon grid and distributed computing by full-scale LHC operations operations which have for years involved many thousands of collaborating members worldwide and accordingly provide the original and natural testbed for grid computing concepts. This book takes the reader on a guided tour encompassing all relevant topics, including programming languages, software engineering, large databases, the Web, and grid- and cloud computing. The important issue of intellectual property regulations for distributed software engineering and computing is also addressed. Aptly, the book closes with a visionary chapter of what may lie ahead. Approachable and requiring only basic understanding of physics and computer sciences, this book is intended for both education and research." |
![]() ![]() You may like...
Mobile Health - Sensors, Analytic…
James M. Rehg, Susan.A Murphy, …
Hardcover
R5,691
Discovery Miles 56 910
Cancer Prediction for Industrial IoT 4.0…
Meenu Gupta, Rachna Jain, …
Hardcover
R3,876
Discovery Miles 38 760
Demystifying Graph Data Science - Graph…
Pethuru Raj, Abhishek Kumar, …
Hardcover
Handbook of Research on Engineering…
Bhushan Patil, Manisha Vohra
Hardcover
R10,287
Discovery Miles 102 870
Information Systems Engineering - From…
Paul Johannesson, Eva Soderstrom
Hardcover
R2,849
Discovery Miles 28 490
Big Data Analytics for Sustainable…
Anandakumar Haldorai, Arulmurugan Ramu
Hardcover
R7,263
Discovery Miles 72 630
|