![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This brief focuses on introducing a novel mathematical framework, referred as hypergraph theory, to model and solve the multiple interferer scenarios for future wireless communication networks. First, in Chap. 1, the authors introduce the basic preliminaries of hypergraph theory in general, and develop two hypergraph based polynomial algorithms, i.e., hypergraph coloring and hypergraph clustering. Then, in Chaps. 2 and 3, the authors present two emerging applications of hypergraph coloring and hypergraph clustering in Device-to-Device (D2D) underlay communication networks, respectively, in order to show the advantages of hypergraph theory compared with the traditional graph theory. Finally, in Chap. 4, the authors discuss the limitations of using hypergraph theory in future wireless networks and briefly present some other potential applications. This brief introduces the state-of-the-art research on the hypergraph theory and its applications in wireless communications. An efficient framework is provided for the researchers, professionals and advanced level students who are interested in the radio resource allocation in the heterogeneous networks to solve the resource allocation and interference management problems.
This book constitutes the thoroughly refereed workshop post-proceedings of the 15th International Workshop on Approximation and Online Algorithms, WAOA 2017, held in Vienna, Austria, in September 2017 as part of ALGO 2017. The 23 revised full papers presented in this book were carefully reviewed and selected from 50 submissions. Topics of interest for WAOA 2017 were: graph algorithms; inapproximability results; network design; packing and covering; paradigms for the design and analysis of approximation and online algorithms; parameterized complexity; scheduling problems; algorithmic game theory; coloring and partitioning; competitive analysis; computational advertising; computational finance; cuts and connectivity; geometric problems; mechanism design; resource augmentation; and real-world applications.
This book introduces Radio Frequency Cell Site Engineering to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications. The presentation is designed to be easily accessible, minimizing mathematics and maximizing visuals.
The two-volume set LNICST 209-210 constitutes the post-conference proceedings of the 11th EAI International Conference on Communications and Networking, ChinaCom 2016, held in Chongqing, China, in September 2016.The total of 107 contributions presented in these volumes are carefully reviewed and selected from 181 submissions. The book is organized in topical sections on MAC schemes, traffic algorithms and routing algorithms, security, coding schemes, relay systems, optical systems and networks, signal detection and estimation, energy harvesting systems, resource allocation schemes, network architecture and SDM, heterogeneous networks, IoT (Internet of Things), hardware design and implementation, mobility management, SDN and clouds, navigation, tracking and localization, future mobile networks.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.
Build clustered and scalable Java-based, real-time applications using Spring Framework, Boot, WebSocket, Cassandra, Redis and RabbitMQ. In this book, you'll tie all this together with a dive-in case study, a real-time scalable chat application under differing scenarios. Pro Java Clustering and Scalability also discusses how to horizontally scale the WebSocket chat application using a full STOMP broker such as RabbitMQ. Although this is a programming book, it also discusses many interesting infrastructure topics and tips about continuous delivery, Docker, NoSQL (Cassandra and Redis) and other related technologies. What You Will Learn Handle clustering and scalability using various open source Java, microservices, and web services tools and technologies Use Spring Framework, Boot, and other Spring technologies Integrate with Redis, RabbitMQ, Cassandra, NoSQL, and much more Test the case study code under various scenarios and stresses Who This Book Is For Experienced Java developers with at least some prior experience with Java, especially Spring Framework, Boot and other tools, and some web services.
This book constitutes the refereed conference proceedings of the 12th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2016, held in Seoul, South Korea, in July 2016. The 27 full papers, 5 short papers and 18 workshop papers were selected from 85 submissions. The papers are organized thematically in tracks, starting with network security, followed by QoS, reliability and modeling, wireless and mobile networks. In addition the papers of two workshops are included: International Workshop on 5G Communication Architecture and Technology (5G-CAT 2016), and the 2nd International Workshop on Sensor Networks and Cloud Computing (SNCC 2016).
This volume constitutes the refereed post-conference proceedings of the Third International Conference on Machine Learning and Intelligent Communications, MLICOM 2018, held in Hangzhou, China, in July 2018. The 66 revised full papers were carefully selected from 102 submissions. The papers are organized thematically in machine learning, intelligent positioning and navigation, intelligent multimedia processing and security, wireless mobile network and security, cognitive radio and intelligent networking, IoT, intelligent satellite communications and networking, green communication and intelligent networking, ad-hoc and sensor networks, resource allocation in wireless and cloud networks, signal processing in wireless and optical communications, and intelligent cooperative communications and networking.
This book constitutes the thoroughly refereed proceedings of the 3rd International Conference on IoT as a service, IoTaaS 2017, held in Taichung, Taiwan, in September 2017. The 46 full papers were carefully selected from 65 submissions. The papers deal with the "Everything as a Service" deployment paradigm which enables the easy adoption of IoT based services and applications by end-users, and forces providers of smart objects and middleware platforms to architect their solutions accordingly. The three special sessions organized were Wearable Technology and Applications (WTAA), Building Smart Machine Applications (BSMA), and Security and Privacy in Internet of Things, Services and People (SP-IoTSP). The WTAA special session aimed to address the challenges of maintaining high efficiency of WTAA in terms of high recognition rate, energy consumption, computational costs and so forth. The BSMA special session aimed to explore how to construct smart machines architecture for the industry under the background of IoT and big data. The SP-IoTSP special session aimed to investigate recent research and future directions for IoTSP security and privacy.
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing theory; cybersecurity and quality service.
This volume constitutes the refereed proceedings of the 13th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2018, held in Oviedo, Spain, in June 2018. The 62 full papers published in this volume were carefully reviewed and selected from 104 submissions. They are organized in the following topical sections: Neurocomputing, fuzzy systems, rough sets, evolutionary algorithms, Agents andMultiagent Systems, and alike.
This book constitutes the joint refereed proceedings of the 18th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2018, the 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018. The 64 revised full papers presented were carefully reviewed and selected from 186 submissions. The papers of NEW2AN focus on advanced wireless networking and applications; lower-layer communication enablers; novel and innovative approaches to performance and efficiency analysis of ad-hoc and machine-type systems; employed game-theoretical formulations, Markov chain models, and advanced queuing theory; grapheme and other emerging material, photonics and optics; generation and processing of signals; and business aspects. The ruSMART papers deal with fully-customized applications and services.
This book constitutes the refereed proceedings of the 21st International Symposium on Fundamentals of Computation Theory, FCT 2017, held in Bordeaux, France, in September 2017. The 29 revised full papers and 5 invited papers presented were carefully reviewed and selected from 99 submissions. The papers cover topics of all aspects of theoretical computer science, in particular algorithms, complexity, formal and logical methods.
The four-volume set LNCS 11070, 11071, 11072, and 11073 constitutes the refereed proceedings of the 21st International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2018, held in Granada, Spain, in September 2018. The 373 revised full papers presented were carefully reviewed and selected from 1068 submissions in a double-blind review process. The papers have been organized in the following topical sections: Part I: Image Quality and Artefacts; Image Reconstruction Methods; Machine Learning in Medical Imaging; Statistical Analysis for Medical Imaging; Image Registration Methods. Part II: Optical and Histology Applications: Optical Imaging Applications; Histology Applications; Microscopy Applications; Optical Coherence Tomography and Other Optical Imaging Applications. Cardiac, Chest and Abdominal Applications: Cardiac Imaging Applications: Colorectal, Kidney and Liver Imaging Applications; Lung Imaging Applications; Breast Imaging Applications; Other Abdominal Applications. Part III: Diffusion Tensor Imaging and Functional MRI: Diffusion Tensor Imaging; Diffusion Weighted Imaging; Functional MRI; Human Connectome. Neuroimaging and Brain Segmentation Methods: Neuroimaging; Brain Segmentation Methods. Part IV: Computer Assisted Intervention: Image Guided Interventions and Surgery; Surgical Planning, Simulation and Work Flow Analysis; Visualization and Augmented Reality. Image Segmentation Methods: General Image Segmentation Methods, Measures and Applications; Multi-Organ Segmentation; Abdominal Segmentation Methods; Cardiac Segmentation Methods; Chest, Lung and Spine Segmentation; Other Segmentation Applications.
Originally published in 1960, as the second edition of a 1957 original, this textbook is aimed at those without advanced mathematical training and provides a comprehensive introductory account of digital computers, what they are capable of doing and how they are made to do it. It begins with a discussion of programming - the preparation of instructions for the computer. This leads on to a consideration of systems of number storage, from the simple decimal system of desk calculating machines to the varieties of binary storage systems used in modern high-speed computers. The final chapter considers points, which arise in applying computers to engineering calculations, and gives details of some of the problems already solved in this way. Throughout the book the emphasis is on the applications of computers to routine work rather than to advanced research. This book will be of value to students of the history of computer science.
This brief focuses on stochastic energy optimization for distributed energy resources in smart grids. Along with a review of drivers and recent developments towards distributed energy resources, this brief presents research challenges of integrating millions of distributed energy resources into the grid. The brief then proposes a novel three-level hierarchical architecture for effectively integrating distributed energy resources into smart grids. Under the proposed hierarchical architecture, distributed energy resource management algorithms at the three levels (i.e., smart home, smart neighborhood, and smart microgrid) are developed in this brief based on stochastic optimization that can handle the involved uncertainties in the system.
This book constitutes revised selected papers from the 12th International Conference on Critical Information Infrastructures Security, CRITIS 201, held in Lucca, Italy, in October 2017. The 21 full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. They present innovative research and explore new challenges in the field of critical information infrastructures protection (C(I)IP) and deal with multi-disciplinary approaches to relevant C(I)IP problems.
This two volume set (CCIS 901 and 902) constitutes the refereed proceedings of the 4th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2018 (originally ICYCSEE) held in Zhengzhou, China, in September 2018. The 125 revised full papers presented in these two volumes were carefully reviewed and selected from 1057 submissions. The papers cover a wide range of topics related to basic theory and techniques for data science including mathematical issues in data science, computational theory for data science, big data management and applications, data quality and data preparation, evaluation and measurement in data science, data visualization, big data mining and knowledge management, infrastructure for data science, machine learning for data science, data security and privacy, applications of data science, case study of data science, multimedia data management and analysis, data-driven scientific research, data-driven bioinformatics, data-driven healthcare, data-driven management, data-driven eGovernment, data-driven smart city/planet, data marketing and economics, social media and recommendation systems, data-driven security, data-driven business model innovation, social and/or organizational impacts of data science.
This two volume set (CCIS 901 and 902) constitutes the refereed proceedings of the 4th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2018 (originally ICYCSEE) held in Zhengzhou, China, in September 2018. The 125 revised full papers presented in these two volumes were carefully reviewed and selected from 1057 submissions. The papers cover a wide range of topics related to basic theory and techniques for data science including mathematical issues in data science, computational theory for data science, big data management and applications, data quality and data preparation, evaluation and measurement in data science, data visualization, big data mining and knowledge management, infrastructure for data science, machine learning for data science, data security and privacy, applications of data science, case study of data science, multimedia data management and analysis, data-driven scientific research, data-driven bioinformatics, data-driven healthcare, data-driven management, data-driven eGovernment, data-driven smart city/planet, data marketing and economics, social media and recommendation systems, data-driven security, data-driven business model innovation, social and/or organizational impacts of data science.
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.
This book constitutes the refereed proceedings of the 16th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2018, held in St. Malo, France, in September 2018. The 21 full and 6 short papers plus 2 invited talks presented in this volume were carefully reviewed and selected from 52 submissions. The contributions were organized in topical sections named: on ad-hoc, mobile and wireless sensor, networks and computing.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Innovations and Interdisciplinary Solutions for Underserved Areas, InterSol 2018, and the 7th Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2018, held in Kigali, Rwanda, in March 2018. The 23 papers presented were selected from 56 submissions and issue the following themes: papers dealing with the evolution of performances of solar systems in Africa, papers addressing the issues is public health, telecom papers studying the business model of telecommunication, math models presenting the climatic phenomenon and finally health papers dealing with medical devices that are suitable to underserved areas. The proceedings also contain 7 papers from the co-located 7th CNRIA (Collogue National sur la Recherche en Informatique et ses Applications) focusing on network architecture and security, software engineering, data management, and signal processing.
This book constitutes the refereed conference proceedings of the 12th International Conference on Multi-disciplinary Trends in Artificial Intelligence, MIWAI 2018, held in Hanoi, Vietnam, in November 2018. The 16 full papers presented together with 9 short papers were carefully reviewed and selected from 65 submissions. They are organized in the following topical sections: control, planning and scheduling, pattern recognition, knowledge mining, software applications, strategy games and others.
There has been a surging interest in developing systems for analyzing big graphs generated by real applications, such as online social networks and knowledge graphs. This book aims to help readers get familiar with the computation models of various graph processing systems with minimal time investment. This book is organized into three parts, addressing three popular computation models for big graph analytics: think-like-a-vertex, think-likea- graph, and think-like-a-matrix. While vertex-centric systems have gained great popularity, the latter two models are currently being actively studied to solve graph problems that cannot be efficiently solved in vertex-centric model, and are the promising next-generation models for big graph analytics. For each part, the authors introduce the state-of-the-art systems, emphasizing on both their technical novelties and hands-on experiences of using them. The systems introduced include Giraph, Pregel+, Blogel, GraphLab, CraphChi, X-Stream, Quegel, SystemML, etc. Readers will learn how to design graph algorithms in various graph analytics systems, and how to choose the most appropriate system for a particular application at hand. The target audience for this book include beginners who are interested in using a big graph analytics system, and students, researchers and practitioners who would like to build their own graph analytics systems with new features.
This two volume set of LNAI 11061 and LNAI 11062 constitutes the refereed proceedings of the 11th International Conference on Knowledge Science, Engineering and Management, KSEM 2018, held in Changchun, China, in August 2018. The 62 revised full papers and 26 short papers presented were carefully reviewed and selected from 262 submissions. The papers of the first volume are organized in the following topical sections: text mining and document analysis; image and video data analysis; data processing and data mining; recommendation algorithms and systems; probabilistic models and applications; knowledge engineering applications; and knowledge graph and knowledge management. The papers of the second volume are organized in the following topical sections: constraints and satisfiability; formal reasoning and ontologies; deep learning; network knowledge representation and learning; and social knowledge analysis and management. |
You may like...
Inhibitory Rules in Data Analysis - A…
Pawel Delimata, Mikhail Ju Moshkov, …
Hardcover
R2,653
Discovery Miles 26 530
Advances in Cognitive Informatics and…
Yingxu Wang, Du Zhang, …
Hardcover
R4,056
Discovery Miles 40 560
Scientific Computing in Electrical…
Ulrich Langer, Wolfgang Amrhein, …
Hardcover
R2,682
Discovery Miles 26 820
Applications of Neural Networks in High…
Johann M. Ph. Schumann, Yan Liu
Hardcover
R4,040
Discovery Miles 40 400
|