![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
This book constitutes the refereed proceedings of the 4th International Symposium on Ubiquitous Networking, UNet 2018, held in Hammamet, Morocco, in May 2018. The 35 full papers presented together with 5 short papers in this volume were carefully reviewed and selected from 87 submissions. The focus of UNet is on technical challenges and solutions related to such a widespread adoption of networking technologies, including broadband multimedia, machine-to-machine applications, Internet of things, security and privacy, data engineering, sensor networks and RFID technologies.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.
This book constitutes the thoroughly refereed post-conference proceedings of the First APWeb-WAIM 2018 Workshops, held jointly with the Second International Joint Conference APWeb-WAIM 2018 in Macau, China, in July 2018. The 31 full papers presented were carefully reviewed and selected from 44 submissions. The papers originating from five workshops present cutting-edge ideas, results, experiences, techniques, and tools from all aspects of web data management with the focus on mobile web data analytics; knowledge graph management and analysis; data management and mining on MOOCs; Big data analytics for healthcare; data science.
This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
This book constitutes the proceedings of the 11th International Conference on Internet and Distributed Computing Systems, IDCS 2018, held in Tokyo, Japan, in October 2018. The 21 full papers presented together with 5 poster and 2 short papers in this volume were carefully reviewed and selected from 40 submissions. This conference desired to look for inspiration in diverse areas (e.g., infrastructure and system design, software development, big data, control theory, artificial intelligence, IoT, self-adaptation, emerging models, paradigms, applications and technologies related to Internet-based distributed systems) to develop new ways to design and mange such complex and adaptive computation resources.
This book constitutes the revised selected papers from the 6th ECML PKDD Workshop on Data Analytics for Renewable Energy Integration, DARE 2018, held in Dublin, Ireland, in September 2018. The 9 papers presented in this volume were carefully reviewed and selected for inclusion in this book and handle topics such as time series forecasting, the detection of faults, cyber security, smart grid and smart cities, technology integration, demand response, and many others.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.
The four-volume set LNCS 11070, 11071, 11072, and 11073 constitutes the refereed proceedings of the 21st International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2018, held in Granada, Spain, in September 2018. The 373 revised full papers presented were carefully reviewed and selected from 1068 submissions in a double-blind review process. The papers have been organized in the following topical sections: Part I: Image Quality and Artefacts; Image Reconstruction Methods; Machine Learning in Medical Imaging; Statistical Analysis for Medical Imaging; Image Registration Methods. Part II: Optical and Histology Applications: Optical Imaging Applications; Histology Applications; Microscopy Applications; Optical Coherence Tomography and Other Optical Imaging Applications. Cardiac, Chest and Abdominal Applications: Cardiac Imaging Applications: Colorectal, Kidney and Liver Imaging Applications; Lung Imaging Applications; Breast Imaging Applications; Other Abdominal Applications. Part III: Diffusion Tensor Imaging and Functional MRI: Diffusion Tensor Imaging; Diffusion Weighted Imaging; Functional MRI; Human Connectome. Neuroimaging and Brain Segmentation Methods: Neuroimaging; Brain Segmentation Methods. Part IV: Computer Assisted Intervention: Image Guided Interventions and Surgery; Surgical Planning, Simulation and Work Flow Analysis; Visualization and Augmented Reality. Image Segmentation Methods: General Image Segmentation Methods, Measures and Applications; Multi-Organ Segmentation; Abdominal Segmentation Methods; Cardiac Segmentation Methods; Chest, Lung and Spine Segmentation; Other Segmentation Applications.
This book constitutes the refereed proceedings of the 15th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2018, held in Hangzhou, China, in October 2018. The 34 full papers presented in this book together with 15 short papers were carefully reviewed and selected from 75 submissions. The papers cover a broad range of topics in the field of cooperative visualization; cooperative design; cooperative engineering; basic theories, methods and technologies that support CDVE; and cooperative applications.
This double volumes LNCS 11229-11230 constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2018, Ontologies, Databases, and Applications of Semantics, ODBASE 2018, and Cloud and Trusted Computing, C&TC, held as part of OTM 2018 in October 2018 in Valletta, Malta. The 64 full papers presented together with 22 short papers were carefully reviewed and selected from 173 submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, informationsystems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.
This book constitutes the refereed proceedings of the 21st International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2018, held in Tokyo, Japan, in October/November 2018. The 27 full papers presented and 31 short papers were carefully reviewed and selected from 103 submissions. PRIMA presents subjects in many application domains, particularly in e-commerce, and also in planning, logistics, manufacturing, robotics, decision support, transportation, entertainment, emergency relief and disaster management, and data mining and analytics.
The three-volume set CCIS 923, CCIS 924, and CCIS 925 constitutes the thoroughly refereed proceedings of the First International Conference on Intelligent Manufacturing and Internet of Things, and of the 5th International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, held in Chongqing, China, in September 2018. The 135 revised full papers presented were carefully reviewed and selected from over 385 submissions.The papers of this volume are organized in topical sections on: digital manufacturing; industrial product design; logistics, production and operation management; manufacturing material; manufacturing optimization; manufacturing process; mechanical transmission system; robotics.
This book provides a comprehensive overview of multiple access techniques used in the cellular industry. The usage of multiple access techniques in telecommunications enables many users to share the same spectrum in the frequency domain, time domain, code domain or phase domain. Licenses are given, by the FCC, to operate wireless communication systems over given bands of frequencies, with the smaller bands, (channels), reused to provide services to other users. Thus, bandwidth efficiency is vital, as the speed and size of digital data networks continue to expand. This brief also uses numerous illustrations to bring students up-to-date in the practical applications of multiple access techniques, which can then be put to work in the industry. Primarily, electrical engineering students who study telecommunications, as well as engineers and designers working in wireless communications, would find this book useful.
The two volumes LNAI 11649 and LNAI 11650 constitute the refereed proceedings of the 20th Annual Conference "Towards Autonomous Robotics", TAROS 2019, held in London, UK, in July 2019. The 74 full papers and 12 short papers presented were carefully reviewed and selected from 101 submissions. The papers present and discuss significant findings and advances in autonomous robotics research and applications. They are organized in the following topical sections: robotic grippers and manipulation; soft robotics, sensing and mobile robots; robotic learning, mapping and planning; human-robot interaction; and robotic systems and applications.
This book constitutes the proceedings of the 20th International Conference on Speech and Computer, SPECOM 2018, held in Leipzig, Germany, in September 2018. The 79 papers presented in this volume were carefully reviewed and selected from 132 submissions. The papers present current research in the area of computer speech processing, including recognition, synthesis, understanding and related domains like signal processing, language and text processing, computational paralinguistics, multi-modal speech processing or human-computer interaction.
This book constitutes the refereed proceedings of the 21th International Conference on Distributed and Computer and Communication Networks, DCCN 2018, held in Moscow, Russia, in September 2018. The 50 full papers and the 9 short papers were carefully reviewed and selected from 168 submissions. The papers cover the following topics: computer and communication networks architecture optimization; control in computer and communication networks; performance and QoS/QoE evaluation in wireless networks; analytical modeling and simulation of next-generation communications systems; queueing theory and reliability theory applications in computer networks; wireless 4G/5G networks, cm- and mm-wave radio technologies; RFID technology and its application in intellectual transportation networks; Internet of Things, wearables, and applications of distributed information systems; probabilistic and statistical models in information systems; mathematical modeling of high-tech systems; mathematical modeling and control problems; distributed and cloud computing systems, big data analytics.
This two-volume set LNICST 286-287 constitutes the post-conference proceedings of the First EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2019, held in Harbin, China, in May 2019. The 93 full papers were carefully reviewed and selected from 152 submissions. The papers are organized in topical sections on artificial intelligence, mobile network, deep learning, machine learning, wireless communication, cognitive radio, internet of things, big data, communication system, pattern recognition, channel model, beamforming, signal processing, 5G, mobile management, resource management, wireless position.
This book (CCIS 837) constitutes the refereed proceedings of the Second International Conference on Soft Computing Systems, ICSCS 2018, held in Sasthamcotta, India, in April 2018. The 87 full papers were carefully reviewed and selected from 439 submissions. The papers are organized in topical sections on soft computing, evolutionary algorithms, image processing, deep learning, artificial intelligence, big data analytics, data minimg, machine learning, VLSI, cloud computing, network communication, power electronics, green energy.
This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019. The 43 full and 11 short papers presented were carefully reviewed and selected from 143 submissions. The papers deal with new ideas and recent advances in computer systems, wireless networks, distributed applications, and advanced algorithms that are pushing forward the new technologies for better information sharing, computer communication, and universal connected devices in various environments, especially in wireless networks.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics VII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Fraud and Malware Investigations, Network Forensics, and Advanced Forensic Techniques. This book is the 7th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of 21 edited papers from the 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2011. Advances in Digital Forensics VII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.
This book constitutes the refereed proceedings of the 10th International ICT Innovations Conference, ICT Innovations 2018, held in Ohrid, Macedonia, in September 2018.The 21 full papers presented were carefully reviewed and selected from 81 submissions. They cover the following topics:sensor applications and deployments, embedded and cyber-physical systems, robotics, network architectures, cloud computing, software infrastructure, software creation and management, models of computation, computational complexity and cryptography, design and analysis of algorithms, mathematical optimization, probability and statistics, data management systems, data mining, human computer interaction (HCI), artificial intelligence, machine learning, life and medical sciences, health care information systems, bioinformatics.
The three-volume set LNCS 101164, 11165, and 11166 constitutes the refereed proceedings of the 19th Pacific-Rim Conference on Multimedia, PCM 2018, held in Hefei, China, in September 2018. The 209 regular papers presented together with 20 special session papers were carefully reviewed and selected from 452 submissions. The papers cover topics such as: multimedia content analysis; multimedia signal processing and communications; and multimedia applications and services.
This two-volume set (CCIS 873 and CCIS 874) constitutes the thoroughly refereed proceedings of the 9th International Symposium, ISICA 2017, held in Guangzhou, China, in November 2017.The 101 full papers presented in both volumes were carefully reviewed and selected from 181 submissions. This first volume is organized in topical sections on neural networks and statistical learning: neural architecture search, transfer of knowledge; evolutionary multi-objective and dynamic optimization: optimal control and design, hybrid methods; data mining: association rule learning, data management platforms; Cloud computing and multiagent systems: service models, Cloud engineering; everywhere connectivity: IoT solutions, wireless sensor networks. |
You may like...
Fundamentals of Ocean Acoustics
L.M. Brekhovskikh, Yu P. Lysanov
Hardcover
R5,300
Discovery Miles 53 000
Project Management in Perspective
Theuns Oosthuizen, Rob Venter
Paperback
R628
Discovery Miles 6 280
Mathematics and Computing - ICMC 2018…
Debdas Ghosh, Debasis Giri, …
Hardcover
R2,732
Discovery Miles 27 320
|