![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This book examines innovation in the fields of computer engineering and networking, and explores important, state-of-the-art developments in areas such as artificial intelligence, machine learning, information analysis and communication. It gathers papers presented at the 8th International Conference on Computer Engineering and Networks (CENet2018), held in Shanghai, China on August 17-19, 2018. * Explores emerging topics in computer engineering and networking, along with their applications * Discusses how to improve productivity by using the latest advanced technologies * Examines innovation in the fields of computer engineering and networking
This volume constitutes the proceedings of the 18th Asia Simulation Conference, AsiaSim 2018, held in Kyoto, Japan, in August 2018. The 45 revised full papers presented in this volume were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on modeling and simulation technology; soft computing and machine learning; high performance computing and cloud computing; simulation technology for industry; simulation technology for intelligent society; simulation of instrumentation and control application; computational mathematics and computational science; flow simulation; visualization and computer vision to support simulation.
This book constitutes the proceedings of the 38th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2018, held in Madrid, Spain, in June 2018, as part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018. The 10 full papers presented were carefully reviewed and selected from 28 submissions. The conference is dedicated to fundamental research on theory, models, tools, and applications for distributed systems.
This book gathers the Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, held on November 8-10, 2017 in Barcelona, Spain. Information networking is currently undergoing a rapid evolution. Different kinds of networks with different characteristics are emerging and being integrated in heterogeneous networks. As a result, there are many interconnected problems that can occur at different levels of the hardware and software design of communicating entities and communication networks. These networks are expected to manage increasing usage demand, provide support for a significant number of services, guarantee Quality of Service (QoS), and optimize the use of network resources. The success of all-IP networking and wireless technology has changed the lifestyles of people around the world, and advances in electronic integration and wireless communications will pave the way to providing access to wireless networks on the fly, as electronic devices can increasingly exchange information with each other virtually anytime and anywhere. The aim of this book is to provide the latest findings, methods and development techniques from both theoretical and practical perspectives regarding the emerging areas of broad-band and wireless computing.
This book constitutes the refereed proceedings of the 16th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2018, held in St. Malo, France, in September 2018. The 21 full and 6 short papers plus 2 invited talks presented in this volume were carefully reviewed and selected from 52 submissions. The contributions were organized in topical sections named: on ad-hoc, mobile and wireless sensor, networks and computing.
This book constitutes the thoroughly refereed proceedings of the 8th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2016, held in Ouagadougou, Burkina Faso, in December 2016. The 44 papers were carefully selected from 57 submissions and cover topics such as: mobile and social networks; cloud, VPN and overlays; IoT, water, land, agriculture; networks, TVWS; learning; crypto and services.
This book constitutes the post-conference proceedings of the 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016, held in Paris, France, in October 2016. The 22 full papers and 8 short papers presented were carefully reviewed and selected from 58 submissions. They present the most recent innovations, trends, results, experiences and concerns in selected perspectives of critical information infrastructure protection covering the range from small-scale cyber-physical systems security via information infrastructures and their interaction with national and international infrastructures.
This book constitutes the proceedings of the 16th International Conference on Information Technologies and Mathematical Modelling, ITMM 2017, held in Kazan, Russia, in September/October 2017. The 31 papers presented in this volume were carefully reviewed and selected from 85 submissions. The conference covers various aspects of mathematical modeling and information technologies, focusing on probabilistic methods and models, queueing theory and communication networks.
This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.
This book constitutes the refereed proceedings of the 13th International Joint Conference on E-Business and Telecommunications, ICETE 2016, held in Lisbon, Portugal, in July 2016. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS.The 20 full papers presented together with an invited paper in this volume were carefully reviewed and selected from 241 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems.
This book constitutes - in conjunction with the two-volume set LNCS 10954 and LNCS 10955 - the refereed proceedings of the 14th International Conference on Intelligent Computing, ICIC 2018, held in Wuhan, China, in August 2018. The 275 full papers and 72 short papers of the three proceedings volumes were carefully reviewed and selected from 632 submissions. The papers are organized in topical sections such as Evolutionary Computation and Learning; Neural Networks; Pattern Recognition; Image Processing; Information Security; Virtual Reality and Human-Computer Interaction; Business Intelligence and Multimedia Technology; Biomedical Informatics Theory and Methods; Swarm Intelligence and Optimization; Natural Computing; Quantum Computing; Intelligent Computing in Computer Vision; Fuzzy Theory and Algorithms; Machine Learning; Systems Biology; Intelligent Systems and Applications for Bioengineering; Evolutionary Optimization: Foundations and Its Applications to Intelligent Data Analytics; Swarm Evolutionary Algorithms for Scheduling and Combinatorial Optimization; Swarm Intelligence and Applications in Combinatorial Qoptimization; Advances in Metaheuristic Optimization Algorithm; Advances in Image Processing and Pattern Techniques; Bioinformatics.
This brief focuses on introducing a novel mathematical framework, referred as hypergraph theory, to model and solve the multiple interferer scenarios for future wireless communication networks. First, in Chap. 1, the authors introduce the basic preliminaries of hypergraph theory in general, and develop two hypergraph based polynomial algorithms, i.e., hypergraph coloring and hypergraph clustering. Then, in Chaps. 2 and 3, the authors present two emerging applications of hypergraph coloring and hypergraph clustering in Device-to-Device (D2D) underlay communication networks, respectively, in order to show the advantages of hypergraph theory compared with the traditional graph theory. Finally, in Chap. 4, the authors discuss the limitations of using hypergraph theory in future wireless networks and briefly present some other potential applications. This brief introduces the state-of-the-art research on the hypergraph theory and its applications in wireless communications. An efficient framework is provided for the researchers, professionals and advanced level students who are interested in the radio resource allocation in the heterogeneous networks to solve the resource allocation and interference management problems.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018. The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.
This book introduces Radio Frequency Cell Site Engineering to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications. The presentation is designed to be easily accessible, minimizing mathematics and maximizing visuals.
This book constitutes the refereed conference proceedings of the 12th International Conference on Multi-disciplinary Trends in Artificial Intelligence, MIWAI 2018, held in Hanoi, Vietnam, in November 2018. The 16 full papers presented together with 9 short papers were carefully reviewed and selected from 65 submissions. They are organized in the following topical sections: control, planning and scheduling, pattern recognition, knowledge mining, software applications, strategy games and others.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial IoT Technologies and Applications, IoT 2017, held in Wuhu, China, in March 2017. The volume contains 25 papers carefully reviewed and selected from 41 submissions focusing on topics such as big data, cloud computing, Internet of things, areas of control, mobile computing, and security.
This book constitutes the post-conference proceedings of the Second EAI International Conference on Smart Grid Inspired Future Technologies, SmartGIFT 2017, held in London, UK, in March 2017. The revised full papers are presented in four tracks: Track 1 - Communications, Networks and Architectures; Track 2 - Smart Control and Operation; Track 3 - Grid and Components; and Track 4 - Data Management and Grid Analytics. Aside from the technical paper presentations, the book also contains five invited talks and two technical workshops. The two workshops organized were: the Improving the Robustness of Urban Electricity Network (IRENE) and Wireless Communications and Networking Technologies for Connected Smart Grids (WCSG). The IRENE workshop aimed to address the new dimension of threats in the critical infrastructures through demonstration of IRENE methodologies and approaches. The WCSG workshop aimed to gain insights into key challenges, understanding and design criteria of employing wireless technologies to develop and implement future smart grids related services and applications.
This SpringerBrief presents the design and performance evaluation of communication protocols based on dissimilarity metrics for wireless multihop networks. Dissimilarity metrics are used to infer the network topology based solely on local information to efficiently disseminate packets throughout the network, reducing both redundancy and congestion which is covered in this brief. The performance evaluation of the proposed communication protocols has been conducted by both meticulous simulation and real experimentation in a wireless multi-hop testbed. The obtained results in this brief corroborate the hypothesis regarding the validity of dissimilarity metrics, which can be used to design efficient communication protocols. This SpringerBrief is a good starting point for advanced-level students studying computer science and electrical engineering, as well as researchers and professionals working in this field.
This book constitutes the refereed proceedings of the 21st International Symposium on Fundamentals of Computation Theory, FCT 2017, held in Bordeaux, France, in September 2017. The 29 revised full papers and 5 invited papers presented were carefully reviewed and selected from 99 submissions. The papers cover topics of all aspects of theoretical computer science, in particular algorithms, complexity, formal and logical methods.
This book constitutes the refereed proceedings of the 21st International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2018, held in Tokyo, Japan, in October/November 2018. The 27 full papers presented and 31 short papers were carefully reviewed and selected from 103 submissions. PRIMA presents subjects in many application domains, particularly in e-commerce, and also in planning, logistics, manufacturing, robotics, decision support, transportation, entertainment, emergency relief and disaster management, and data mining and analytics.
This book constitutes the thoroughly refereed proceedings of the 3rd International Conference on IoT as a service, IoTaaS 2017, held in Taichung, Taiwan, in September 2017. The 46 full papers were carefully selected from 65 submissions. The papers deal with the "Everything as a Service" deployment paradigm which enables the easy adoption of IoT based services and applications by end-users, and forces providers of smart objects and middleware platforms to architect their solutions accordingly. The three special sessions organized were Wearable Technology and Applications (WTAA), Building Smart Machine Applications (BSMA), and Security and Privacy in Internet of Things, Services and People (SP-IoTSP). The WTAA special session aimed to address the challenges of maintaining high efficiency of WTAA in terms of high recognition rate, energy consumption, computational costs and so forth. The BSMA special session aimed to explore how to construct smart machines architecture for the industry under the background of IoT and big data. The SP-IoTSP special session aimed to investigate recent research and future directions for IoTSP security and privacy.
This volume constitutes the refereed post-conference proceedings of the Third International Conference on Machine Learning and Intelligent Communications, MLICOM 2018, held in Hangzhou, China, in July 2018. The 66 revised full papers were carefully selected from 102 submissions. The papers are organized thematically in machine learning, intelligent positioning and navigation, intelligent multimedia processing and security, wireless mobile network and security, cognitive radio and intelligent networking, IoT, intelligent satellite communications and networking, green communication and intelligent networking, ad-hoc and sensor networks, resource allocation in wireless and cloud networks, signal processing in wireless and optical communications, and intelligent cooperative communications and networking.
This book constitutes the refereed proceedings of the Third International Conference on Future Network Systems and Security, FNSS 2017, held in Gainesville, FL, USA, during August/September 2017. The 15 full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on protocol design and secure implementation, security protocols and attack countermeasures, big data and future applications.
This volume constitutes the refereed proceedings of the 13th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2018, held in Oviedo, Spain, in June 2018. The 62 full papers published in this volume were carefully reviewed and selected from 104 submissions. They are organized in the following topical sections: Neurocomputing, fuzzy systems, rough sets, evolutionary algorithms, Agents andMultiagent Systems, and alike. |
You may like...
Generalized Convexity and Vector…
Shashi K. Mishra, Shouyang Wang, …
Hardcover
R2,684
Discovery Miles 26 840
An Introduction to Modern Variational…
Bozidar D. Vujanovic, Teodor M. Atanackovic
Paperback
R1,425
Discovery Miles 14 250
Advances in Mechanics and Mathematics…
Gao David Yang, Raymond W. Ogden
Hardcover
R4,061
Discovery Miles 40 610
Township Economy - People, Spaces And…
Andrew Charman, Leif Petersen, …
Paperback
(1)
Menahem Max Schiffer: Selected Papers…
Peter Duren, Lawrence Zalcman
Hardcover
R2,804
Discovery Miles 28 040
|