![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This two-volume set (CCIS 873 and CCIS 874) constitutes the thoroughly refereed proceedings of the 9th International Symposium, ISICA 2017, held in Guangzhou, China, in November 2017.The 101 full papers presented in both volumes were carefully reviewed and selected from 181 submissions. This first volume is organized in topical sections on neural networks and statistical learning: neural architecture search, transfer of knowledge; evolutionary multi-objective and dynamic optimization: optimal control and design, hybrid methods; data mining: association rule learning, data management platforms; Cloud computing and multiagent systems: service models, Cloud engineering; everywhere connectivity: IoT solutions, wireless sensor networks.
This two-volume set (CCIS 873 and CCIS 874) constitutes the thoroughly refereed proceedings of the 9th International Symposium, ISICA 2017, held in Guangzhou, China, in November 2017. The 101 full papers presented in both volumes were carefully reviewed and selected from 181 submissions. This second volume is organized in topical sections on swarm intelligence: cooperative Search, swarm optimization; complex systems modeling: system dynamic, multimedia simulation; intelligent information systems: information retrieval, e-commerce platforms; artificial intelligence and robotics: query optimization, intelligent engineering; virtualization: motion-based tracking, image recognition.
This book constitutes the thoroughly refereed proceedings of the 26th International Conference on Computer Networks, CN 2019, held in Gliwice, Poland, in June 2019. The 29 full papers presented were carefully reviewed and selected from 64 submissions. They are organized in topical sections on computer networks; communications; and queueing theory and queuing networks.
This book (CCIS 899) constitutes the refereed proceedings of the First International Conference on Applications of Computing and Communication Technologies, ICACCT 2018, held in Delhi, India, in March 2018. The 30 full papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on communication and system technologies, computing and network technologies, application and services.
This book constitutes the refereed proceedings of the 10th International Conference on Functional Imaging and Modeling of the Heart, held in Bordeaux, France, in June 2019. The 46 revised full papers were carefully reviewed and selected from 50 submissions. The focus of the papers is on following topics: Electrophysiology: mapping and biophysical modelling; Novel imaging tools and analysis methods for myocardial tissue characterization and remodeling; Biomechanics: modeling and tissue property measurements; Advanced cardiac image analysis tools for diagnostic and interventions.
This book constitutes the revised selected papers from the First International Conference on Computing, Analytics and Networks, ICAN 2017, held in Rajpura, India, in October 2017.The 20 revised full papers presented in this volume were carefully reviewed and selected from 56 submissions. They are organized in topical sections on Mobile Cloud Computing; Big Data Analytics; Secure Networks. Five papers in this book are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. For further details, please see the copyright page.
This two-volume set LNCS 10954 and LNCS 10955 constitutes - in conjunction with the volume LNAI 10956 - the refereed proceedings of the 14th International Conference on Intelligent Computing, ICIC 2018, held in Wuhan, China, in August 2018. The 275 full papers and 72 short papers of the three proceedings volumes were carefully reviewed and selected from 632 submissions. The papers are organized in topical sections such as Neural Networks.- Pattern Recognition.- Image Processing.- Intelligent Computing in Robotics.- Intelligent Control and Automation.- Intelligent Data Analysis and Prediction.- Fuzzy Theory and Algorithms.- Supervised Learning.- Unsupervised Learning.- Kernel Methods and Supporting Vector Machines.- Knowledge Discovery and Data Mining.- Natural Language Processing and Computational Linguistics.- Gene Expression Array Analysis.- Systems Biology.- Computational Genomics.- Computational Proteomics.- Gene Regulation Modeling and Analysis.- Protein-Protein Interaction Prediction.- Next-Gen Sequencing and Metagenomics.- Structure Prediction and Folding.- Evolutionary Optimization for Scheduling.- High-Throughput Biomedical Data Integration and Mining.- Machine Learning Algorithms and Applications.- Heuristic Optimization Algorithms for Real-World Applications.- Evolutionary Multi-Objective Optimization and Its Applications.- Swarm Evolutionary Algorithms for Scheduling and Combinatorial.- Optimization.- Swarm Intelligence and Applications in Combinatorial Optimization.- Advances in Metaheuristic Optimization Algorithm.- Advances in Image Processing and Pattern Recognition Techniques.- AI in Biomedicine.- Bioinformatics.- Biometrics Recognition.- Information Security.- Virtual Reality and Human-Computer Interaction.- Healthcare Informatics Theory and Methods.- Intelligent Computing in Computer Vision.- Intelligent Agent and Web Applications.- Reinforcement Learning.- Machine Learning.- Modeling, Simulation, and Optimization of Biological Systems.- Biomedical Data Modeling and Mining.- Cheminformatics.- Intelligent Computing in Computational Biology.- Protein Structure and Function Prediction.- Biomarker Discovery.- Hybrid Computational Intelligence: Theory and Application in Bioinformatics, Computational Biology and Systems Biology.- IoT and Smart Data.- Intelligent Systems and Applications for Bioengineering.- Evolutionary Optimization: Foundations and Its Applications to Intelligent Data Analytics.- Protein and Gene Bioinformatics: Analysis, Algorithms and Applications.
This book constitutes the refereed proceedings of the 4th International Conference on Future Network Systems and Security, FNSS 2018, held in Paris, France, in July 2018. The 14 full papers and two short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on secure design and verication; security, privacy and ethics; big data and applications of future network systems.
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
The two-volume set of LNCS 10941 and 10942 constitutes the proceedings of the 9th International Conference on Advances in Swarm Intelligence, ICSI 2018, held in Shanghai, China, in June 2018. The total of 113 papers presented in these volumes was carefully reviewed and selected from 197 submissions. The papers were organized in topical sections as follows: theories and models of swarm intelligence; ant colony optimization; particle swarm optimization; artificial bee colony algorithms; genetic algorithms; differential evolution; fireworks algorithms; bacterial foraging optimization; artificial immune system; hydrologic cycle optimization; other swarm-based optimization algorithms; hybrid optimization algorithms; multi-objective optimization; large-scale global optimization; multi-agent systems; swarm robotics; fuzzy logic approaches; planning and routing problems; recommendation in social media; prediction, classification; finding patterns; image enhancement; deep learning.
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.
This two-volume set (CCIS 848 and CCIS 849) constitutes the thoroughly refereed proceedings of the 5th International Conference Geo-Spatial Knowledge and Intelligence, GSKI 2017, held in Chiang Mai, Thailand, in December 2018.The 142 full papers presented were carefully reviewed and selected from 579 submissions. They are organized in topical sections on smart city in resource management and sustainable ecosystem; spatial data acquisition through RS and GIS in resource management and sustainable ecosystem; ecological and environmental data processing and management; advanced geospatial model and analysis for understanding ecological and environmental process; applications of geo-informatics in resource management and sustainable ecosystem.
This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.
The 3 volume-set LNCS 10901, 10902 + 10903 constitutes the refereed proceedings of the 20th International Conference on Human-Computer Interaction, HCI 2018, which took place in Las Vegas, Nevada, in July 2018. The total of 1171 papers and 160 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4346 submissions. HCI 2018 includes a total of 145 papers; they were organized in topical sections named: Part I: HCI theories, methods and tools; perception and psychological issues in HCI; emotion and attention recognition; security, privacy and ethics in HCI. Part II: HCI in medicine; HCI for health and wellbeing; HCI in cultural heritage; HCI in complex environments; mobile and wearable HCI. Part III: input techniques and devices; speech-based interfaces and chatbots; gesture, motion and eye-tracking based interaction; games and gamification.
Cognitive radio networks (CRN) will be widely deployed in the near future, and this SpringerBrief covers some important aspects of it, as well as highlighting optimization strategies in Resource Allocation and Spectrum Sensing in CRNs. The cognitive approach in radio access is introduced in the first part of this SpringerBrief, and then next the benefits of cooperative spectrum sensing are highlighted and a framework for studying it under realistic channel conditions is described. New exact closed-form expressions for average false alarm probability and average detection probability are derived in this scenario. A novel approximation to alleviate the computational complexity of the proposed models are also discussed. Once the spectrum opportunities are identified, efficient and systematic resource allocation (RA) shall be performed. The second part of this SpringerBrief describes the taxonomy for the RA process in CRN. A comprehensive overview of the optimization strategies of the CRN RA is also provided. The device-to-device (D2D) communication scenario is discussed, then as a case study and various optimization strategies for the application of the CR technology in the D2D realm is studied. The application of advanced geometric water-filling (GWF) approach in CRN D2D environment for optimum resource allocation is presented in detail. Numerical results provide more insight quantitatively. Overall, this book is suitable for a wide audience that include students, faculty and researchers in wireless communication area and professionals in the wireless service industry.
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Mobile Networks and Management, MONAMI 2017, held in Melbourne, Australia, in December 2017. The 30 revised full papers were carefully reviewed and selected from 43 submissions. The papers handle topics in the area of mobile computing, wireless networking and management.
This two-volume set (CCIS 848 and CCIS 849) constitutes the thoroughly refereed proceedings of the 5th International Conference Geo-Spatial Knowledge and Intelligence, GSKI 2017, held in Chiang Mai, Thailand, in December 2018.The 142 full papers presented were carefully reviewed and selected from 579 submissions. They are organized in topical sections on smart city in resource management and sustainable ecosystem; spatial data acquisition through RS and GIS in resource management and sustainable ecosystem; ecological and environmental data processing and management; advanced geospatial model and analysis for understanding ecological and environmental process; applications of geo-informatics in resource management and sustainable ecosystem.
The 3 volume-set LNCS 10901, 10902 + 10903 constitutes the refereed proceedings of the 20th International Conference on Human-Computer Interaction, HCI 2018, which took place in Las Vegas, Nevada, in July 2018. The total of 1171 papers and 160 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4346 submissions. HCI 2018 includes a total of 145 papers; they were organized in topical sections named: Part I: HCI theories, methods and tools; perception and psychological issues in HCI; emotion and attention recognition; security, privacy and ethics in HCI. Part II: HCI in medicine; HCI for health and wellbeing; HCI in cultural heritage; HCI in complex environments; mobile and wearable HCI. Part III: input techniques and devices; speech-based interfaces and chatbots; gesture, motion and eye-tracking based interaction; games and gamification.
This book constitutes the proceedings of the 22nd International Symposium on Fundamentals of Computation Theory, FCT 2019, held in Copenhagen, Denmark, in August 2019.The 21 full papers included in this volume were carefully reviewed and selected from 45 submissions. In addition, the book contains 3 invited talks in full-paper length. The papers were organized in topical sections named: formal methods, complexity, and algorithms.
The four-volume set LNCS 11583, 11584, 11585, and 11586 constitutes the proceedings of the 8th International Conference on Design, User Experience, and Usability, DUXU 2019, held as part of the 21st International Conference, HCI International 2019, which took place in Orlando, FL, USA, in July 2019. The total of 1274 papers and 209 posters included in the 35 HCII 2019 proceedings volumes was carefully reviewed and selected from 5029 submissions. DUXU 2019 includes a total of 167 regular papers, organized in the following topical sections: design philosophy; design theories, methods, and tools; user requirements, preferences emotions and personality; visual DUXU; DUXU for novel interaction techniques and devices; DUXU and robots; DUXU for AI and AI for DUXU; dialogue, narrative, storytelling; DUXU for automated driving, transport, sustainability and smart cities; DUXU for cultural heritage; DUXU for well-being; DUXU for learning; user experience evaluation methods and tools; DUXU practice; DUXU case studies.
This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2019, held in Rabat, Morocco, in July 2019. The 22 papers presented in this book were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on protocols; post-quantum cryptography; zero-knowledge; lattice based cryptography; new schemes and analysis; block ciphers; side-channel attacks and countermeasures; signatures. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).
This book constitutes the refereed proceedings of the 7th Workshop on New Frontiers in Quantitative Methods in Informatics, InfQ 2017, held in Venice, Italy, in December 2017. The 11 revised full papers and the one revised short paper presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on networking and mobile applications; applications of quantitative modeling; big data processing and IoT; theory, methods and tools for quantitative analysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Mobile, Secure and Programmable Networking, held in Mohammedia, Morocco, in April 2019. The 23 papers presented in this volume were carefully reviewed and selected from 48 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.
This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017.The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.
This book constitutes the refereed proceedings of the 2nd EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019, held in Tianjin, China, in April 2019. The 62 full papers were selected from 112 submissions and are grouped into topics on privacy and security analysis, Internet of Things and cloud computing, system building, scheme, model and application for data, mechanism and method in new computing. |
You may like...
Private Cloud Computing - Consolidation…
Stephen R. Smoot, Nam K. Tan
Paperback
R1,225
Discovery Miles 12 250
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
When Compressive Sensing Meets Mobile…
Linghe Kong, Bowen Wang, …
Hardcover
R2,653
Discovery Miles 26 530
Malicious Attack Propagation and Source…
Jiaojiao Jiang, Sheng Wen, …
Hardcover
R3,336
Discovery Miles 33 360
Handbook of Computer Networks and Cyber…
Brij B. Gupta, Gregorio Martinez Perez, …
Hardcover
R7,167
Discovery Miles 71 670
Crossbar-Based Interconnection Networks…
Mohsen Jahanshahi, Fathollah Bistouni
Hardcover
R1,408
Discovery Miles 14 080
Designing Networks for Innovation and…
Matthaus P. Zylka, Hauke Fuehres, …
Hardcover
|