![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This book constitutes the refereed proceedings of the 19th Annual European Symposium on Algorithms, ESA 2011, held in Saarbrucken, Germany, in September 2011 in the context of the combined conference ALGO 2011. The 67 revised full papers presented were carefully reviewed and selected from 255 initial submissions: 55 out of 209 in track design and analysis and 12 out of 46 in track engineering and applications. The papers are organized in topical sections on approximation algorithms, computational geometry, game theory, graph algorithms, stable matchings and auctions, optimization, online algorithms, exponential-time algorithms, parameterized algorithms, scheduling, data structures, graphs and games, distributed computing and networking, strings and sorting, as well as local search and set systems.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Agents and Artificial Intelligence, ICAART 2011, held in Rome, Italy, in January 2011. The 26 revised full papers presented together with two invited paper were carefully reviewed and selected from 367 submissions. The papers are organized in two topical sections on artificial intelligence and on agents.
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications.
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
This book constitutes the joint thoroughly refereed post-proceedings of The Modeling Social Media Workshop, MSM 2010 held in Toronto, Canada in June 2010 and the International Workshop on Mining Ubiquitous and Social Environments, MUSE 2010, held in Barcelona, Spain in September 2010. The eight revised full papers included were carefully reviewed and selected after two rounds of reviewing and revision. The papers address various aspects of the analysis and engineering of socio-computational systems in which social, ubiquitous and computational processes are interdependent and tightly interwoven
This book constitutes the refereed proceedings of the 8th
International Conference on Cooperative Design, Visualization, and
Engineering, CDVE 2011, held in Hong Kong, China, in September
2011.
This book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2012, which was held in Shanghai, China, in May 2012. The 14 revised papers presented were carefully reviewed and selected from 24 submissions. The papers cover the following topics: parallel batch scheduling; workload analysis and modeling; resource management system software studies; and Web scheduling.
Communication Systems: The State of the Art captures the depth and breadth of the field of communication systems: -Architectures and Protocols for Distributed Systems; -Network and Internetwork Architectures; -Performance of Communication Systems; -Internet Applications Engineering; -Management of Networks and Distributed Systems; -Smart Networks; -Wireless Communications; -Communication Systems for Developing Countries; -Photonic Networking; -Communication Systems in Electronic Commerce. This volume's scope and authority present a rare opportunity for people in many different fields to gain a practical understanding of where the leading edge in communication systems lies today-and where it will be tomorrow.
This book constitutes the refereed proceedings of the 8th International Workshop on Internet and Network Economics, WINE 2012, held in Liverpool, UK, in December 2012. The 36 revised full papers and 13 revised short papers presented together with the abstracts of 3 papers about work in progress and 3 invited talks were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on algorithmic game theory; algorithmic mechanism design; auction algorithms and analysis; computational advertising; computational aspects of equilibria; computational social choice; convergence and learning in games; coalitions, coordination and collective action; economics aspects of security and privacy; economics aspects of distributed and network computing; information and attention economics; network games; price differentiation and price dynamics; social networks.
An oft-repeated adage among telecommunication providers goes, "There are ve things that matter: reliability, reliability, reliability, time to market, and cost. If you can't do all ve, at least do the rst three. " Yet, designing and operating reliable networks and services is a Herculean task. Building truly reliable components is unacceptably expensive, forcing us to c- struct reliable systems out of unreliable components. The resulting systems are inherently complex, consisting of many different kinds of components running a variety of different protocols that interact in subtle ways. Inter-networkssuch as the Internet span multiple regions of administrative control, from campus and cor- rate networks to Internet Service Providers, making good end-to-end performance a shared responsibility borne by sometimes uncooperative parties. Moreover, these networks consist not only of routers, but also lower-layer devices such as optical switches and higher-layer components such as rewalls and proxies. And, these components are highly con gurable, leaving ample room for operator error and buggy software. As if that were not dif cult enough, end users understandably care about the performance of their higher-level applications, which has a complicated relationship with the behavior of the underlying network. Despite these challenges, researchers and practitioners alike have made trem- dous strides in improving the reliability of modern networks and services.
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a timely spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to stimulate discussions and novel scientific collaborations. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2010 and August/September 2011. The topics covered in this book include privacy and data protection; security APIs; cryptographic verification by typing; model-driven security; noninterfer-quantitative information flow analysis; and risk analysis.
This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle, WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference . The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are organized in topical sections on privacy protection and quantification, security in cloud and sensor networks and secure data managment technologies.
This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network.
The areas of communications, computer networks, and signal processing have undergone rapid development over the past several years. The advent of VLSI circuitry and increasingly sophisticated computer hardware and software techniques have made possible the construction of systems and signal proces sors for. communications applications not contemplated only a short time ago. The increasing complexity of communication systems, both by themselves and in land-based or satellite networks, has created a greater need for finding use ful mathematical techniques for their analysis. The rapidly evolving technolo gies involved continue to find exciting new areas for application, and it remains a challenge for researchers to keep abreast of developments. In this volume researchers from a broad cross section of the areas of communications, signal processing, and computer networks have been invited to contribute articles to assist readers in learning about the current state of research and future research directions in their area. The authors were not given tight guidelines for their contributions and thus the character and emphasis of each chapter differs. Although the scope of the areas considered is necessarily limited in a volume of this size, the coverage here is quite broad and it is hoped that the reader will find the contents of this volume to be interesting, useful, and informative."
Despite the significant ongoing work in the development of new database systems, many of the basic architectural and performance tradeoffs involved in their design have not previously been explored in a systematic manner. The designers of the various systems have adopted a wide range of strategies in areas such as process structure, client-server interaction, concurrency control, transaction management, and memory management. This monograph investigates several fundamental aspects of the emerging generation of database systems. It describes and investigates implementation techniques to provide high performance and scalability while maintaining the transaction semantics, reliability, and availability associated with more traditional database architectures. The common theme of the techniques developed here is the exploitation of client resources through caching-based data replication. Client Data Caching: A Foundation for High Performance Object Database Systems should be a value to anyone interested in the performance and architecture of distributed information systems in general and Object-based Database Management Systems in particular. It provides useful information for designers of such systems, as well as for practitioners who need to understand the inherent tradeoffs among the architectural alternatives in order to evaluate existing systems. Furthermore, many of the issues addressed in this book are relevant to other systems beyond the ODBMS domain. Such systems include shared-disk parallel database systems, distributed file systems, and distributed virtual memory systems. The presentation is suitable for practitioners and advanced students in all of these areas, although a basic understanding of database transaction semantics and techniques is assumed.
Intelligent Integration of Information presents a collection of chapters bringing the science of intelligent integration forward. The focus on integration defines tasks that increase the value of information when information from multiple sources is accessed, related, and combined. This contributed volume has also been published as a special double issue of the Journal of Intelligent Information Systems (JIIS), Volume 6:2/3.
This book constitutes the refereed proceedings of the 5th International Conference on Scalable Uncertainty Management, SUM 2011, held in Dayton, OH, USA, in October 2011. The 32 revised full papers and 3 revised short papers presented together with the abstracts of 2 invited talks and 6 "discussant" contributions were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on argumentation systems, probabilistic inference, dynamic of beliefs, information retrieval and databases, ontologies, possibility theory and classification, logic programming, and applications.
This book constitutes the refereed proceedings of the 24th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2012, held in Aalborg, Denmark, in November 2012. The 16 revised full papers presented together with 2 invited talks were carefully selected from 48 submissions. The papers are organized in topical sections on testing in practice, test frameworks for distributed systems, testing of embedded systems, test optimization, and new testing methods.
This book constitutes the refereed proceedings of the 7th International Conference on Grid and Pervasive Computing, GPC 2012, held in Hong Kong, China, in May 2012. The 9 revised full papers and 19 short papers were carefully revised and selected from 55 submissions. They are organized in topical sections on cloud computing, grid and service computing, green computing, mobile and pervasive computing, scheduling and performance, and trust and security. Also included are 4 papers presented at the 2012 International Workshop on Mobile Cloud and Ubiquitous Computing (Mobi-Cloud 2012) held in conjunction with GPC 2012.
This book constitutes revised selected papers of the 7th International Workshop on Formal Aspects of Component Software, FACS 2010, held in Guimaraes, Portugal, in October 2010. The 13 full papers and 4 short papers presented together with 1 panel discussion and 2 invited talks were carefully reviewed and selected from 37 submissions. The workshop seeks to develop a better understanding on how formal methods can or should be used for component-based software development to succeed.
This book constitutes the refereed proceedings of the 4th
International Conference on Progress in Cultural Heritage
Preservation, EuroMed 2012, held in Lemesos, Cyprus, in
October/November 2012.
It is a general trend in computing that computers are becoming ever smaller and ever more interconnected. Sensor networks - large networks of small, simple devices - are a logical extreme of this trend. Wireless sensor networks (WSNs) are attracting an increasing degree of research interest, with a growing number of industrial applications starting to emerge. Two of these applications, personal health monitoring and emergency/disaster recovery, are the focus of the European Commission project ProSense: Promote, Mobilize, Reinforce and Integrate Wireless Sensor Networking Research and Researchers. This hands-on introduction to WSN systems development presents a broad coverage of topics in the field, contributed by researchers involved in the ProSense project. An emphasis is placed on the practical knowledge required for the successful implementation of WSNs. Divided into four parts, the first part covers basic issues of sensors, software, and position-based routing protocols. Part two focuses on multidisciplinary issues, including sensor network integration, mobility aspects, georouting, medical applications, and vehicular sensor networks. The remaining two parts present case studies and further applications. Topics and features: presents a broad overview of WSN technology, including an introduction to sensor and sensing technologies; contains an extensive section on case studies, providing details of the development of a number of WSN applications; discusses frameworks for WSN systems integration, through which WSN technology will become fundamental to the Future Internet concept; investigates real-world applications of WSN systems in medical and vehicular sensor networks; with a Foreword by the Nobel Laurate Professor Martin Perl of Stanford University. Providing holistic coverage of WSN technology, this text/reference will enable graduate students of computer science, electrical engineering and telecommunications to master the specific domains of this emerging area. The book will also be a valuable resource for researchers and practitioners interested in entering the field.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Mobile Multimedia Communications (MOBIMEDIA 2011) held in Cagliari, Italy, in September 2011 The 26 revised full papers presented were carefully selected from numerous submissions and focus topics such as quality of experience, dynamic spectrum access wireless networks in the TV white spaces, media streaming, mobile visual search, image processing and transmission, and mobile applications.
The Hybrid Deliberative Layer (HDL) solves the problem that an intelligent agent faces in dealing with a large amount of information which may or may not be useful in generating a plan to achieve a goal. The information, that an agent may need, is acquired and stored in the DL model. Thus, the HDL is used as the main knowledge base system for the agent. In this work, a novel approach which amalgamates Description Logic (DL) reasoning with Hierarchical Task Network (HTN) planning is introduced. An analysis of the performance of the approach has been conducted and the results show that this approach yields significantly smaller planning problem descriptions than those generated by current representations in HTN planning. |
You may like...
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Malicious Attack Propagation and Source…
Jiaojiao Jiang, Sheng Wen, …
Hardcover
R3,336
Discovery Miles 33 360
Handbook of Computer Networks and Cyber…
Brij B. Gupta, Gregorio Martinez Perez, …
Hardcover
R7,167
Discovery Miles 71 670
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,633
Discovery Miles 66 330
Engineering Scalable, Elastic, and…
Steffen Becker, Gunnar Brataas, …
Hardcover
R2,017
Discovery Miles 20 170
Architectural Design - Conception and…
Chris A. Vissers, Luis Ferreira Pires, …
Hardcover
|