![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017.The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more.The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.
Cognitive radio networks (CRN) will be widely deployed in the near future, and this SpringerBrief covers some important aspects of it, as well as highlighting optimization strategies in Resource Allocation and Spectrum Sensing in CRNs. The cognitive approach in radio access is introduced in the first part of this SpringerBrief, and then next the benefits of cooperative spectrum sensing are highlighted and a framework for studying it under realistic channel conditions is described. New exact closed-form expressions for average false alarm probability and average detection probability are derived in this scenario. A novel approximation to alleviate the computational complexity of the proposed models are also discussed. Once the spectrum opportunities are identified, efficient and systematic resource allocation (RA) shall be performed. The second part of this SpringerBrief describes the taxonomy for the RA process in CRN. A comprehensive overview of the optimization strategies of the CRN RA is also provided. The device-to-device (D2D) communication scenario is discussed, then as a case study and various optimization strategies for the application of the CR technology in the D2D realm is studied. The application of advanced geometric water-filling (GWF) approach in CRN D2D environment for optimum resource allocation is presented in detail. Numerical results provide more insight quantitatively. Overall, this book is suitable for a wide audience that include students, faculty and researchers in wireless communication area and professionals in the wireless service industry.
This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019. The 43 full and 11 short papers presented were carefully reviewed and selected from 143 submissions. The papers deal with new ideas and recent advances in computer systems, wireless networks, distributed applications, and advanced algorithms that are pushing forward the new technologies for better information sharing, computer communication, and universal connected devices in various environments, especially in wireless networks.
This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017.The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.
This book constitutes the refereed proceedings of the 2nd EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019, held in Tianjin, China, in April 2019. The 62 full papers were selected from 112 submissions and are grouped into topics on privacy and security analysis, Internet of Things and cloud computing, system building, scheme, model and application for data, mechanism and method in new computing.
The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017. The total of 112 contributions presented in these volumes are carefully reviewed and selected from 178 submissions. The papers are organized in topical sections on wireless communications and networking, satellite and space communications and networking, big data network track, multimedia communications and smart networking, signal processing and communications, network and information security, advances and trends of V2X networks.
The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017. The total of 112 contributions presented in these volumes are carefully reviewed and selected from 178 submissions. Aside from the technical paper sessions the book is organized in topical sections on wireless communications and networking, satellite and space communications and networking, big data network track, multimedia communications and smart networking, signal processing and communications, network and information security, advances and trends of V2X networks.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Technology and Innovation in Learning, Teaching and Education, TECH-EDU 2018, held in Thessaloniki, Greece, on June 20-22, 2018. The 30 revised full papers along with 18 short papers presented were carefully reviewed and selected from 80 submissions.The papers are organized in topical sections on new technologies and teaching approaches to promote the strategies of self and co-regulation learning (new-TECH to SCRL); eLearning 2.0: trends, challenges and innovative perspectives; building critical thinking in higher education: meeting the challenge; digital tools in S and T learning; exploratory potentialities of emerging technologies in education; learning technologies; digital technologies and instructional design; big data in education and learning analytics.
This book constitutes the refereed proceedings of the Second International EAI Conference on Emerging Technologies for Developing Countries, AFRICATEK 2018, held in Cotonou, Benin, in May 2018. The 12 revised full papers and 4 short papers were selected from 27 submissions. The papers are organized thematically in tracks, starting with ITS and security, applications and IT services, gaming and user experience.
The three-volume set CCIS 1032, CCIS 1033, and CCIS 1034 contains the extended abstracts of the posters presented during the 21st International Conference on Human-Computer Interaction, HCII 2019, which took place in Orlando, Florida, in July 2019.The total of 1274 papers and 209 posters included in the 35 HCII 2019 proceedings volumes was carefully reviewed and selected from 5029 submissions. The 208 papers presented in these three volumes are organized in topical sections as follows: Part I: design, development and evaluation methods and technique; multimodal Interaction; security and trust; accessibility and universal access; design and user experience case studies. Part II:interacting with games; human robot interaction; AI and machine learning in HCI; physiological measuring; object, motion and activity recognition; virtual and augmented reality; intelligent interactive environments. Part III: new trends in social media; HCI in business; learning technologies; HCI in transport and autonomous driving; HCI for health and well-being.
The four-volume set LNCS 11583, 11584, 11585, and 11586 constitutes the proceedings of the 8th International Conference on Design, User Experience, and Usability, DUXU 2019, held as part of the 21st International Conference, HCI International 2019, which took place in Orlando, FL, USA, in July 2019. The total of 1274 papers and 209 posters included in the 35 HCII 2019 proceedings volumes was carefully reviewed and selected from 5029 submissions. DUXU 2019 includes a total of 167 regular papers, organized in the following topical sections: design philosophy; design theories, methods, and tools; user requirements, preferences emotions and personality; visual DUXU; DUXU for novel interaction techniques and devices; DUXU and robots; DUXU for AI and AI for DUXU; dialogue, narrative, storytelling; DUXU for automated driving, transport, sustainability and smart cities; DUXU for cultural heritage; DUXU for well-being; DUXU for learning; user experience evaluation methods and tools; DUXU practice; DUXU case studies.
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-one edited papers from the Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the University of Hong Kong, Hong Kong, China, in January 2010.
This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2019, held in Rabat, Morocco, in July 2019. The 22 papers presented in this book were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on protocols; post-quantum cryptography; zero-knowledge; lattice based cryptography; new schemes and analysis; block ciphers; side-channel attacks and countermeasures; signatures. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).
This book constitutes the proceedings of the 8th International Conference on Artificial Intelligence and Mobile Services, AIMS 2019, held as part of SCF 2019, in San Diego, CA, USA, in June 2019. The 12 full papers and one short paper presented were carefully reviewed and selected from 29 submissions. The papers cover different aspects of mobile services from business management to computing systems, algorithms and applications. They promote technological technological innovations in research and development of mobile services, including, but not limited to, wireless and sensor networks, mobile and wearable computing, mobile enterprise and eCommerce, ubiquitous collaborative and social services, machine-to-machine and Internet-of-things, clouds, cyber-physical integration, and big data analytics for mobility-enabled services.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Mobile, Secure and Programmable Networking, held in Mohammedia, Morocco, in April 2019. The 23 papers presented in this volume were carefully reviewed and selected from 48 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.
This book constitutes the refereed proceedings of the 13th International Conference on Augmented Cognition, AC 2019, held as part of the 21st International Conference on Human-Computer Interaction, HCII 2019, in Orlando, FL, USA in July, 2019. The 1274 full papers and 209 posters presented at the HCII 2019 conferences were carefully reviewed and selected from 5029 submissions. The papers cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of applications areas. The papers in this volume are organized in the following topical sections: cognitive modeling, perception, emotion and interaction; human cognition and behavior in complex tasks and environments; brain-computer interfaces and electroencephalography; and augmented learning.
This book presents high-quality original contributions on the development of automatic traffic analysis systems that are able to not only anticipate traffic scenarios, but also understand the behavior of road users (vehicles, bikes, trucks, etc.) in order to provide better traffic management, prevent accidents and, potentially, identify criminal behaviors. Topics also include traffic surveillance and vehicle accident analysis using formal concept analysis, convolutional and recurrent neural networks, unsupervised learning and process mining. The content is based on papers presented at the 1st Italian Conference for the Traffic Police (TRAP), which was held in Rome in October 2017. This conference represents a targeted response to the challenges facing the police in connection with managing massive traffic data, finding patterns from historical datasets, and analyzing complex traffic phenomena in order to anticipate potential criminal behaviors. The book will appeal to researchers, practitioners and decision makers interested in traffic monitoring and analysis, traffic modeling and simulation, mobility and social data mining, as well as members of the police.
This book constitutes the proceedings of the Second International Conference on Space Information Network, SINC 2017, held in Yinchuan, China, in August 2017. The 27 full and three short papers presented in this volume were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on system architecture and efficient networking mechanism; theory and method of high speed transmission; sparse representation and fusion processing.
This book constitutes the refereed proceedings of the 9th International Conference on Ad Hoc Networks, AdHocNets 2017, held in Niagara Falls, Ontario, USA, in September 2017. The 19 full papers were selected from 30 submissions and cover a variety of network paradigms including mobile ad hoc networks (MANETs), sensor networks, vehicular networks, underwater networks, airborne networks, underground networks, personal area networks, device-to-device (D2D) communications in 5G cellular networks, and home networks. The papers present a wide range of applications in civilian, commercial, and military areas.
This book constitutes the proceedings of the 21th International Conference on Coordination Models and Languages, COORDINATION 2019, held in Kongens Lyngby, Denmark, in June 2019, as part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019. The 15 full papers included in this volume were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections named: computational models; tools; exploring new frontiers; and coordination patterns.
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Wireless Internet, WICON 2016, held in Haikou, China, in December 2016. The 30 full and 4 poster papers were selected from 62 submissions and are grouped into the following topics: sensor networks, security, wireless networks, Internet of Things.
This book constitutes the refereed post-workshop proceedings of the 5th IAPR TC9 Workshop on Pattern Recognition of Social Signals in Human-Computer-Interaction, MPRSS 2018, held in Beijing, China, in August 2018. The 10 revised papers presented in this book focus on pattern recognition, machine learning and information fusion methods with applications in social signal processing, including multimodal emotion recognition and pain intensity estimation, especially the question how to distinguish between human emotions from pain or stress induced by pain is discussed.
This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
This book constitutes the proceedings of the First International Conference on Frontiers in Cyber Security, held in Chengdu, China, in November 2018. The 18 full papers along with the3 short papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections, namely: symmetric key cryptography, public key cryptography, post-quantum cryptography, cloud security and data deduplication, access control, attack and behavior detection, system and network security, security design. |
You may like...
Handbook of Research on Digital…
Richard Pettinger, Alexandru Roja, …
Hardcover
R7,971
Discovery Miles 79 710
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
R1,136
Discovery Miles 11 360
Computer-Graphic Facial Reconstruction
John G. Clement, Murray K. Marks
Hardcover
R2,327
Discovery Miles 23 270
Glory of the Lord VOL 6 - Theology: The…
Hans Urs Von Balthasar
Hardcover
R5,931
Discovery Miles 59 310
Glory of the Lord VOL 1 - Seeing The…
Hans Urs Von Balthasar
Hardcover
R5,634
Discovery Miles 56 340
|