0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (15)
  • R500+ (4,482)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Mining Over Air: Wireless Communication Networks Analytics (Hardcover, 1st ed. 2018): Ye Ouyang, Mantian Hu, Alexis Huet,... Mining Over Air: Wireless Communication Networks Analytics (Hardcover, 1st ed. 2018)
Ye Ouyang, Mantian Hu, Alexis Huet, Zhongyuan Li
R2,885 Discovery Miles 28 850 Ships in 18 - 22 working days

This book introduces the concepts, applications and development of data science in the telecommunications industry by focusing on advanced machine learning and data mining methodologies in the wireless networks domain. Mining Over Air describes the problems and their solutions for wireless network performance and quality, device quality readiness and returns analytics, wireless resource usage profiling, network traffic anomaly detection, intelligence-based self-organizing networks, telecom marketing, social influence, and other important applications in the telecom industry. Written by authors who study big data analytics in wireless networks and telecommunication markets from both industrial and academic perspectives, the book targets the pain points in telecommunication networks and markets through big data. Designed for both practitioners and researchers, the book explores the intersection between the development of new engineering technology and uses data from the industry to understand consumer behavior. It combines engineering savvy with insights about human behavior. Engineers will understand how the data generated from the technology can be used to understand the consumer behavior and social scientists will get a better understanding of the data generation process.

Heterogeneous Information Network Analysis and Applications (Hardcover, 1st ed. 2017): Chuan Shi, Philip S. Yu Heterogeneous Information Network Analysis and Applications (Hardcover, 1st ed. 2017)
Chuan Shi, Philip S. Yu
R4,305 Discovery Miles 43 050 Ships in 10 - 15 working days

This book offers researchers an understanding of the fundamental issues and a good starting point to work on this rapidly expanding field. It provides a comprehensive survey of current developments of heterogeneous information network. It also presents the newest research in applications of heterogeneous information networks to similarity search, ranking, clustering, recommendation. This information will help researchers to understand how to analyze networked data with heterogeneous information networks. Common data mining tasks are explored, including similarity search, ranking, and recommendation. The book illustrates some prototypes which analyze networked data. Professionals and academics working in data analytics, networks, machine learning, and data mining will find this content valuable. It is also suitable for advanced-level students in computer science who are interested in networking or pattern recognition.

Communities of Practice - Fostering Peer-to-Peer Learning and Informal Knowledge Sharing in the Work Place (Hardcover, 2009... Communities of Practice - Fostering Peer-to-Peer Learning and Informal Knowledge Sharing in the Work Place (Hardcover, 2009 ed.)
Noriko Hara
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

1.1 Introduction Each year corporations spend millions of dollars training and educating their - ployees. On average, these corporations spend approximately one thousand dollars 1 per employee each year. As businesses struggle to stay on the cutting-edge and to keep their employees educated and up-to-speed with professional trends as well as ever-changing information needs, it is easy to see why corporations are investing more time and money than ever in their efforts to support their employees' prof- sional development. During the Industrial Age, companies strove to control natural resources. The more resources they controlled, the greater their competitive edge in the mark- place. Senge (1993) refers to this kind of organization as resource-based. In the Information Age, companies must create, disseminate, and effectively use kno- edge within their organization in order to maintain their market share. Senge - scribes this kind of organization as knowledge-based. Given that knowledge-based organizations willcontinuetobeadrivingforcebehindtheeconomy, itisimperative that corporations support the knowledge and information needs of their workers.

Combinatorial Optimization in Communication Networks (Hardcover, and and): Maggie Xiaoyan Cheng, Yingshu Li, Dingzhu Du Combinatorial Optimization in Communication Networks (Hardcover, and and)
Maggie Xiaoyan Cheng, Yingshu Li, Dingzhu Du
R4,373 Discovery Miles 43 730 Ships in 18 - 22 working days

Combinatorial optimization algorithms are used in many applications including the design, management, and operations of communication networks. The objective of this book is to advance and promote the theory and applications of combinatorial optimization in communication networks. Each chapter of the book is written by an expert dealing with theoretical, computational, or applied aspects of combinatorial optimization. Topics covered in the book include the combinatorial optimization problems arising in optical networks, wireless ad hoc networks, sensor networks, mobile communication systems, and satellite networks. A variety of problems are addressed using combinatorial optimization techniques, ranging from routing and resource allocation to QoS provisioning.

Scalable Network Monitoring in High Speed Networks (Hardcover, 2011 ed.): Baek-Young Choi, Zhi-Li Zhang, David Hung-Chang Du Scalable Network Monitoring in High Speed Networks (Hardcover, 2011 ed.)
Baek-Young Choi, Zhi-Li Zhang, David Hung-Chang Du
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Network monitoring serves as the basis for a wide scope of network, engineering and management operations. Precise network monitoring involves inspecting every packet traversing in a network. However, this is not feasible with future high-speed networks, due to significant overheads of processing, storing, and transferring measured data. Network Monitoring in High Speed Networks presents accurate measurement schemes from both traffic and performance perspectives, and introduces adaptive sampling techniques for various granularities of traffic measurement. The techniques allow monitoring systems to control the accuracy of estimations, and adapt sampling probability dynamically according to traffic conditions. The issues surrounding network delays for practical performance monitoring are discussed in the second part of this book. Case studies based on real operational network traces are provided throughout this book. Network Monitoring in High Speed Networks is designed as a secondary text or reference book for advanced-level students and researchers concentrating on computer science and electrical engineering. Professionals working within the networking industry will also find this book useful.

The Economics of Financial and Medical Identity Theft (Hardcover, 2012): L. Jean Camp, M. Eric Johnson The Economics of Financial and Medical Identity Theft (Hardcover, 2012)
L. Jean Camp, M. Eric Johnson
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear.

The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book.

The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided.

Analysis and Design of Networked Control Systems (Hardcover, 2015 ed.): Keyou You, Nan Xiao, Lihua Xie Analysis and Design of Networked Control Systems (Hardcover, 2015 ed.)
Keyou You, Nan Xiao, Lihua Xie
R3,745 R3,485 Discovery Miles 34 850 Save R260 (7%) Ships in 10 - 15 working days

This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: * minimum data rate for stabilization of linear systems over noisy channels; * minimum network requirement for stabilization of linear systems over fading channels; and * stability of Kalman filtering with intermittent observations. A fundamental link is revealed between the topological entropy of linear dynamical systems and the capacities of communication channels. The design of a logarithmic quantizer for the stabilization of linear systems under various network environments is also extensively discussed and solutions to many problems of Kalman filtering with intermittent observations are demonstrated. Analysis and Design of Networked Control Systems will interest control theorists and engineers working with networked systems and may also be used as a resource for graduate students with backgrounds in applied mathematics, communications or control who are studying such systems.

Green Symbiotic Cloud Communications (Hardcover, 1st ed. 2017): H. D. Mustafa, Shabbir N. Merchant, Uday B. Desai, Brij Mohan... Green Symbiotic Cloud Communications (Hardcover, 1st ed. 2017)
H. D. Mustafa, Shabbir N. Merchant, Uday B. Desai, Brij Mohan Baveja
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book intends to change the perception of modern day telecommunications. Communication systems, usually perceived as "dumb pipes", carrying information / data from one point to another, are evolved into intelligently communicating smart systems. The book introduces a new field of cloud communications. The concept, theory, and architecture of this new field of cloud communications are discussed. The book lays down nine design postulates that form the basis of the development of a first of its kind cloud communication paradigm entitled Green Symbiotic Cloud Communications or GSCC. The proposed design postulates are formulated in a generic way to form the backbone for development of systems and technologies of the future. The book can be used to develop courses that serve as an essential part of graduate curriculum in computer science and electrical engineering. Such courses can be independent or part of high-level research courses. The book will also be of interest to a wide range of readers including both scientific and non-scientific domains as it discusses innovations from a simplistic explanatory viewpoint.

Computer and Computing Technologies in Agriculture III - Third IFIP TC 12 International Conference, CCTA 2009, Beijing, China,... Computer and Computing Technologies in Agriculture III - Third IFIP TC 12 International Conference, CCTA 2009, Beijing, China, October 14-17, 2009, Revised Selected Papers (Hardcover, Edition.)
Daoliang Li, Chunjiang Zhao
R2,758 Discovery Miles 27 580 Ships in 18 - 22 working days

I want to express my sincere thanks to all authors who submitted research papers to support the Third IFIP International Conference on Computer and Computing Te- nologies in Agriculture and the Third Symposium on Development of Rural Infor- tion (CCTA 2009) held in China, during October 14-17, 2009. This conference was hosted by the CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University), China National En- neering Research Center for Information Technology in Agriculture, Asian Conf- ence on Precision Agriculture, International Federation for Information Processing, Chinese Society of Agricultural Engineering, Beijing Society for Information Te- nology in Agriculture, and the Chinese Society for Agricultural Machinery. The pla- num sponsor includes the Ministry of Science and Technology of China, Ministry of Agriculture of China, Ministry of Education of China, among others. The CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University) focuses on research and development of advanced and practical technologies applied in agriculture and on promoting international communi- tion and cooperation. It has successfully held three International Conferences on C- puter and Computing Technologies in Agriculture, namely CCTA 2007, CCTA 2008 and CCTA 2009. Sustainable agriculture is the focus of the whole world currently, and therefore the application of information technology in agriculture is becoming more and more - portant. 'Informatized agriculture' has been sought by many countries recently in order to scientifically manage agriculture to achieve low costs and high incomes.

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,311 Discovery Miles 33 110 Ships in 10 - 15 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

"Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems.

Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."

Security in Smart Home Networks (Hardcover, 1st ed. 2023): Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen Security in Smart Home Networks (Hardcover, 1st ed. 2023)
Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen
R3,304 Discovery Miles 33 040 Ships in 18 - 22 working days

This book presents the security and privacy challenges of the smart home following the logic of "terminal device - voice interface - application platform". For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.

Content Distribution for Mobile Internet: A Cloud-based Approach (Hardcover, 2nd ed. 2023): Zhenhua Li, Yafei Dai, Guihai Chen,... Content Distribution for Mobile Internet: A Cloud-based Approach (Hardcover, 2nd ed. 2023)
Zhenhua Li, Yafei Dai, Guihai Chen, Yunhao Liu
R4,626 Discovery Miles 46 260 Ships in 10 - 15 working days

Content distribution, i.e., distributing digital content from one node to another node or multiple nodes, is the most fundamental function of the Internet. Since Amazon's launch of EC2 in 2006 and Apple's release of the iPhone in 2007, Internet content distribution has shown a strong trend toward polarization. On the one hand, considerable investments have been made in creating heavyweight, integrated data centers ("heavy-cloud") all over the world, in order to achieve economies of scale and high flexibility/efficiency of content distribution. On the other hand, end-user devices ("light-end") have become increasingly lightweight, mobile and heterogeneous, creating new demands concerning traffic usage, energy consumption, bandwidth, latency, reliability, and/or the security of content distribution. Based on comprehensive real-world measurements at scale, we observe that existing content distribution techniques often perform poorly under the abovementioned new circumstances. Motivated by the trend of "heavy-cloud vs. light-end," this book is dedicated to uncovering the root causes of today's mobile networking problems and designing innovative cloud-based solutions to practically address such problems. Our work has produced not only academic papers published in prestigious conference proceedings like SIGCOMM, NSDI, MobiCom and MobiSys, but also concrete effects on industrial systems such as Xiaomi Mobile, MIUI OS, Tencent App Store, Baidu PhoneGuard, and WiFi.com. A series of practical takeaways and easy-to-follow testimonials are provided to researchers and practitioners working in mobile networking and cloud computing. In addition, we have released as much code and data used in our research as possible to benefit the community.

End-to-End Quality of Service Over Heterogeneous Networks (Hardcover, 2008 ed.): Torsten Braun, Michel Diaz, Jose Enriquez... End-to-End Quality of Service Over Heterogeneous Networks (Hardcover, 2008 ed.)
Torsten Braun, Michel Diaz, Jose Enriquez Gabeiras, Thomas Staub
R2,679 Discovery Miles 26 790 Ships in 18 - 22 working days

The Internet has evolved from an academic network for data applications such as le transfer and net news, to a global general-purpose network used for a variety of different applications-electronic mail, voice over IP, television, peer-to-peer le sharing, video streaming and many more. The heterogeneity of applications results in rather different application requirements in terms of bandwidth, delay, loss, etc. Ideally, the underlying network supports Quality-of-Service parameters such that - plications can request the desired services from the network and do not need to take actions by themselves to achieve the desired communication quality. Initially, the Internet was not designed to support Quality of Service, and only in the last decade have appropriate mechanisms been developed. Those mechanisms operate mainly on theInternetProtocol(IP) level, butalso network-speci cmechanisms-e. g., targeted to particular wired/wireless access network technologies-are required. The goal of the European 6th Framework Programme (FP6) Integrated Project "End-to-end Quality of Service Support over Heterogeneous Networks" (EuQoS) was to develop, implement and evaluate concepts and mechanisms to support QoS end-to-end, meaning that QoS mechanisms in end systems, access networks, inter- main links and within domains must be supported. The EuQoS project developed an impressiveset ofinnovativesolutionsandnovelscienti cideastosupportend-to-end QoS on the Internet. New mechanisms and concepts were designed and implemented in a European-wide distributed testbed. In addition to the rather technical design and implementation work, the project also developed training material introducing basic QoS mechanisms and techniques.

Routing in Opportunistic Networks (Hardcover, 2013 ed.): Isaac Woungang, Sanjay Kumar Dhurandher, Alagan Anpalagan, Athanasios... Routing in Opportunistic Networks (Hardcover, 2013 ed.)
Isaac Woungang, Sanjay Kumar Dhurandher, Alagan Anpalagan, Athanasios V Vasilakos
R5,426 R4,834 Discovery Miles 48 340 Save R592 (11%) Ships in 10 - 15 working days

Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.

A Glimpse Beyond 5G in Wireless Networks (Hardcover, 1st ed. 2023): Mohammad Abdul Matin A Glimpse Beyond 5G in Wireless Networks (Hardcover, 1st ed. 2023)
Mohammad Abdul Matin
R4,266 Discovery Miles 42 660 Ships in 18 - 22 working days

This book gathers the latest research findings on emerging trends in 5G and beyond wireless systems. The authors present and assess different enabling technologies, capabilities, and anticipated communications and computing solutions for 5G and beyond. Topics discussed include new frequency bands, new multiple antenna systems, massive D2D connectivity, new network deployment, and more. These discussions help the readers to understand more advanced research materials for developing new ideas to make a contribution in this field for themselves. This book aims to serve as a virtual and effective bridge between academic research in theory and engineering development in practice. Students, professional, and practitioners who seek to learn the latest development in wireless technologies should find interest in this book.

Traffic Engineering - A Practical Approach (Hardcover, 1st ed. 2023): Franco Callegati, Walter Cerroni, Carla Raffaelli Traffic Engineering - A Practical Approach (Hardcover, 1st ed. 2023)
Franco Callegati, Walter Cerroni, Carla Raffaelli
R860 Discovery Miles 8 600 Ships in 10 - 15 working days

This textbook discusses the principles of queuing theory and teletraffic engineering in telecommunication networks. The book lays out the rigorous theoretical background while keeping strong links to practical applications and real-life scenarios. The overall goal of this textbook is to provide students with in-depth and broad understanding of the operational framework of teletraffic problems, and therefore the capability to select the most suitable and effective method to solve traffic engineering problems that may arise in real-life. The student will learn to pick and choose from a spectrum of tools, ranging from the simplest mathematical treatment to sophisticated models. The book features practical examples derived from real life, presented and discussed, establishing the links with the theoretical results. Pedagogical materials include end-of-chapter exercises and problems.

Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2... Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers (Hardcover, 1st ed. 2022)
Michael Friedewald, Stephan Krenn, Ina Schiering, Stefan Schiffner
R2,435 Discovery Miles 24 350 Ships in 18 - 22 working days

This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August 2021.The 9 full papers included in this volume were carefully reviewed and selected from 23 submissions. Also included are 2 invited keynote papers and 3 tutorial/workshop summary papers. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.

Multiaccess, Reservations & Queues (Hardcover, 2008 ed.): Dee Denteneer, J. S. H. Van Leeuwaarden Multiaccess, Reservations & Queues (Hardcover, 2008 ed.)
Dee Denteneer, J. S. H. Van Leeuwaarden
R2,673 Discovery Miles 26 730 Ships in 18 - 22 working days

Reservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request phase in which a station reserves the communication channel and a transmission phase in which the actual data transmission takes place. Such procedures are often applied in communication networks that are characterised by a shared communication channel with large round-trip times.

In this book, we propose queuing models for situations that require a reservation procedure and validate their applicability in the context of cable networks.

We offer various mathematical models to better understand the performance of these reservation procedures. The book covers four key performance models, and modifications to these: Contention trees, the repairman model, the bulk service queue, and tandem queues.

The relevance of this book is not limited to reservation procedures and cable networks, and performance analysts from a variety of areas may benefit, as all models have found application in other fields as well.

E-Health - First IMIA/IFIP Joint Symposium, E-Health 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23,... E-Health - First IMIA/IFIP Joint Symposium, E-Health 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, Edition.)
Hiroshi Takeda
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

For the first time in history, the International Federation for Information Processing (IFIP) and the International Medical Informatics Association (IMIA) held the joint "E-Health" Symposium as part of "Treat IT" stream of the IFIP World Congress 2010 at Brisbane, Australia during September 22-23, 2010. IMIA is an independent organization established under Swiss law in 1989. The organization originated in 1967 from Technical Committee 4 of IFIP that is a n- governmental, non-profit umbrella organization for national societies working in the field of information processing. It was established in 1960 under the auspices of UNESCO following the First World Computer Congress held in Paris in 1959. Today, IFIP has several types of members and maintains friendly connections to specialized agencies of the UN system and non-governmental organizations. Technical work, which is the heart of IFIP's activity, is managed by a series of Technical Committees. Due to strong needs for promoting informatics in healthcare and the rapid progress of information and communication technology, IMIA President Reinhold Haux p- posed to strengthen the collaboration with IFIP. The IMIA General Assembly (GA) approved the move and an IMIA Vice President (VP) for special services (Hiroshi Takeda) was assigned as a liaison to IFIP at Brisbane during MEDINFO2007 where th the 40 birthday of IMIA was celebrated.

The Evolution of Pervasive Information Systems (Hardcover, 1st ed. 2023): Manuele Kirsch Pinheiro, Carine Souveyet, Philippe... The Evolution of Pervasive Information Systems (Hardcover, 1st ed. 2023)
Manuele Kirsch Pinheiro, Carine Souveyet, Philippe Roose, Luiz Angelo Steffenel
R4,297 Discovery Miles 42 970 Ships in 10 - 15 working days

This book covers several aspects related the evolution of Information Systems into Pervasive Information Systems. New IT trends have an important impact on IT infrastructures, which become increasingly heterogeneous, flexible, and dynamic. These new trends are transforming Information Systems into what we call Pervasive Information Systems. The purpose of this book is to combine "state-of-the-art" solutions from various research communities (such as Information Systems Engineering, Cloud Computing, Fog/Edge Computing, Pervasive systems, Distributed systems, and Middleware systems) related to the Pervasive Information Systems emergence as a common point of view. Through these multiple contributions, this book tackles important challenges concerning Information Systems evolution, promoting a holistic view of Pervasive Information System. Pervasive Information Systems (PIS) can be defined as a new class of Information Systems. It can be characterized by an IT that is gradually embedded in the physical environment and can accommodate the user's requirements and desires when necessary. This evolution implies considering Information Systems beyond the organization's physical environment to integrate new technologies transparently, leading to a pervasive environment whose behavior should be more and more reactive & proactive. It corresponds to an important change in Information Systems Engineering. Pervasive Information Systems are deeply multidisciplinary systems, demanding a holistic view in which multiple domains are invited to contribute.

Computational Intelligence in Data Science - 4th IFIP TC 12 International Conference, ICCIDS 2021, Chennai, India, March 18-20,... Computational Intelligence in Data Science - 4th IFIP TC 12 International Conference, ICCIDS 2021, Chennai, India, March 18-20, 2021, Revised Selected Papers (Hardcover, 1st ed. 2021)
Vallidevi Krishnamurthy, Suresh Jaganathan, Kanchana Rajaram, Saraswathi Shunmuganathan
R2,438 Discovery Miles 24 380 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the Fourth IFIP TC 12 International Conference on Computational Intelligence in Data Science, ICCIDS 2021, held in Chennai, India, in March 2021. The 20 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers cover topics such as computational intelligence for text analysis; computational intelligence for image and video analysis; blockchain and data science.

Artificial Intelligence for Knowledge Management, Energy, and Sustainability - 9th IFIP WG 12.6 and 1st IFIP WG 12.11... Artificial Intelligence for Knowledge Management, Energy, and Sustainability - 9th IFIP WG 12.6 and 1st IFIP WG 12.11 International Workshop, AI4KMES 2021, Held at IJCAI 2021, Montreal, QC, Canada, August 19-20, 2021, Revised Selected Papers (Hardcover, 1st ed. 2022)
Eunika Mercier-Laurent, Gulgun Kayakutlu
R2,438 Discovery Miles 24 380 Ships in 18 - 22 working days

This book features a selection of extended papers presented at the 9th IFIP WG 12.6 International Workshop on Artificial Intelligence for Knowledge Management, AI4KM 2021, and the 1st International Workshop on Energy and Sustainability, AIES 2021, named AI4KMES 2021 and held in conjunction with IJCAI 2021 in August 2021. The conference was planned to take place in Montreal, Canada, but changed to an online event due to the COVID-19 pandemic. The 15 papers included in this book were carefully reviewed and selected from 17 submissions. They deal with knowledge management and sustainability challenges, focusing on methodological, technical and organizational aspects of AI used for facing related complex problems. This year's topic was AI for Knowledge Management, Energy and Sustainable Future.

Memristor Computing Systems (Hardcover, 1st ed. 2022): Leon O. Chua, Ronald Tetzlaff, Angela Slavova Memristor Computing Systems (Hardcover, 1st ed. 2022)
Leon O. Chua, Ronald Tetzlaff, Angela Slavova
R4,273 Discovery Miles 42 730 Ships in 18 - 22 working days

This contributed volume offers practical solutions and design-, modeling-, and implementation-related insights that address current research problems in memristors, memristive devices, and memristor computing. The book studies and addresses related challenges in and proposes solutions for the future of memristor computing. State-of-the-art research on memristor modeling, memristive interconnections, memory circuit architectures, software simulation tools, and applications of memristors in computing are presented. Utilising contributions from numerous experts in the field, written in clear language and illustrated throughout, this book is a comprehensive reference work. Memristor Computing Systems explains memristors and memristive devices in an accessible way for graduate students and researchers with a basic knowledge of electrical and control systems engineering, as well as prompting further research for more experienced academics.

Access Control Models and Architectures For IoT and Cyber Physical Systems (Hardcover, 1st ed. 2022): Maanak Gupta, Smriti... Access Control Models and Architectures For IoT and Cyber Physical Systems (Hardcover, 1st ed. 2022)
Maanak Gupta, Smriti Bhatt, Asma Hassan Alshehri, Ravi Sandhu
R3,984 Discovery Miles 39 840 Ships in 10 - 15 working days

This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS. The authors discuss different architectures, frameworks, access control models, implementation scenarios, and a broad set of use-cases in different IoT and CPS domains. This provides readers an intuitive and easy to read set of chapters. The authors also discuss IoT and CPS access control solutions provided by key industry players including Amazon Web Services (AWS) and Google Cloud Platform (GCP). It provides extensions of the authors proposed fine grained solutions with these widely used cloud and edge supported platforms. This book is designed to serve the computer science and the cybersecurity community including researchers, academicians and students. Practitioners who have a wider interest in IoT, CPS, privacy and security aspects will also find this book useful. Thanks to the holistic planning and thoughtful organization of this book, the readers are expected to gain in-depth knowledge of the state-of-the-art access control architectures and security models for resilient IoT and CPS.

Integrating IoT and AI for Indoor Air Quality Assessment (Hardcover, 1st ed. 2022): Jagriti Saini, Maitreyee Dutta, Goncalo... Integrating IoT and AI for Indoor Air Quality Assessment (Hardcover, 1st ed. 2022)
Jagriti Saini, Maitreyee Dutta, Goncalo Marques, Malka N Halgamuge
R2,532 Discovery Miles 25 320 Ships in 10 - 15 working days

This book presents Internet of Things (IoT) solutions monitoring and assessing a variety of applications areas for indoor air quality (IAQ). This book synthesizes recent developments, presents case studies, and discusses new methods in the area of air quality monitoring, all the while addressing public health concerns. The authors discuss the issues and solutions, including IoT systems that can provide a continuous flow of data retrieved from cost-effective sensors that can be used in multiple applications.The authors present the leading IoT technologies, applications, algorithms, systems, and future scope in this multi-disciplinary domain.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Group Representation for Quantum Theory
Masahito Hayashi Hardcover R4,443 Discovery Miles 44 430
Automorphic Forms - Research in Number…
Bernhard Heim, Mehiddin Al-Baali, … Hardcover R3,885 R3,354 Discovery Miles 33 540
Semilocal Categories and Modules with…
Alberto Facchini Hardcover R3,410 Discovery Miles 34 100
Semihypergroup Theory
Bijan Davvaz Paperback R1,373 Discovery Miles 13 730
Supersymmetry
Vladimir K Dobrev Hardcover R3,634 Discovery Miles 36 340
Yakov Berkovich; Zvonimir Janko: Groups…
Yakov G Berkovich, Zvonimir Janko Hardcover R5,738 Discovery Miles 57 380
Noncommutative Spacetimes - Symmetries…
Paolo Aschieri, Marija Dimitrijevic, … Hardcover R1,755 Discovery Miles 17 550
Group Theory in Physics, Volume 1 - An…
John F. Cornwell Paperback R2,532 Discovery Miles 25 320
Geometric Methods in Physics XXXV…
Piotr Kielanowski, Anatol Odzijewicz, … Hardcover R2,682 Discovery Miles 26 820
Groups, Modules, and Model Theory…
Manfred Droste, Laszlo Fuchs, … Hardcover R3,630 Discovery Miles 36 300

 

Partners