![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2019, held in Rabat, Morocco, in July 2019. The 22 papers presented in this book were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on protocols; post-quantum cryptography; zero-knowledge; lattice based cryptography; new schemes and analysis; block ciphers; side-channel attacks and countermeasures; signatures. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).
The two volumes LNAI 11649 and LNAI 11650 constitute the refereed proceedings of the 20th Annual Conference "Towards Autonomous Robotics", TAROS 2019, held in London, UK, in July 2019. The 74 full papers and 12 short papers presented were carefully reviewed and selected from 101 submissions. The papers present and discuss significant findings and advances in autonomous robotics research and applications. They are organized in the following topical sections: robotic grippers and manipulation; soft robotics, sensing and mobile robots; robotic learning, mapping and planning; human-robot interaction; and robotic systems and applications.
The three-volume set CCIS 1032, CCIS 1033, and CCIS 1034 contains the extended abstracts of the posters presented during the 21st International Conference on Human-Computer Interaction, HCII 2019, which took place in Orlando, Florida, in July 2019.The total of 1274 papers and 209 posters included in the 35 HCII 2019 proceedings volumes was carefully reviewed and selected from 5029 submissions. The 208 papers presented in these three volumes are organized in topical sections as follows: Part I: design, development and evaluation methods and technique; multimodal Interaction; security and trust; accessibility and universal access; design and user experience case studies. Part II:interacting with games; human robot interaction; AI and machine learning in HCI; physiological measuring; object, motion and activity recognition; virtual and augmented reality; intelligent interactive environments. Part III: new trends in social media; HCI in business; learning technologies; HCI in transport and autonomous driving; HCI for health and well-being.
This book constitutes the refereed post-workshop proceedings of the 5th IAPR TC9 Workshop on Pattern Recognition of Social Signals in Human-Computer-Interaction, MPRSS 2018, held in Beijing, China, in August 2018. The 10 revised papers presented in this book focus on pattern recognition, machine learning and information fusion methods with applications in social signal processing, including multimodal emotion recognition and pain intensity estimation, especially the question how to distinguish between human emotions from pain or stress induced by pain is discussed.
This volume constitutes the proceedings of the 26th International Conference on Web Services, ICWS 2019, held as part of SCF 2019 in San Diego, CA, USA in June 2019. The 11 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 31 submissions. ICWS has been a prime international forum for both researchers and industry practitioners to exchange the latest fundamental advances in the state of the art and practice of Web-based services, to identify emerging research topics, and to define the future of Web-based services. Topics include Internet services modeling, discovery, composition, testing, adaptation, delivery, as well as standards.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Technology and Innovation in Learning, Teaching and Education, TECH-EDU 2018, held in Thessaloniki, Greece, on June 20-22, 2018. The 30 revised full papers along with 18 short papers presented were carefully reviewed and selected from 80 submissions.The papers are organized in topical sections on new technologies and teaching approaches to promote the strategies of self and co-regulation learning (new-TECH to SCRL); eLearning 2.0: trends, challenges and innovative perspectives; building critical thinking in higher education: meeting the challenge; digital tools in S and T learning; exploratory potentialities of emerging technologies in education; learning technologies; digital technologies and instructional design; big data in education and learning analytics.
SAS ODS graphics users will learn in this book how to visually understand and communicate the significance of data to deliver images for quick and easy insight, with precise numbers. Many charts or plots require the viewer to run the eye from a bar end or plot point to some point on an axis, and then to interpolate between tick marks to estimate the value. Some design choices can lead to wrong conclusions or mistaken impressions. Graphic software relies on defaults to deliver something if you make a minimal effort, but that something is not likely to be exactly what you want. Visual Data Insights Using SAS ODS Graphics provides examples using experience-based design principles. It presents examples of bar charts, pie charts, and trend lines or time series plots, the graph types commonly used in business, other organizations, and the media for visual insight into data. Newer graphs are also included: dot plots, needle plots, waterfall charts, butterfly charts, heat maps, bubble plots, step plots, high-low plots, and donut charts. In addition, there are basic tools of statistics: scatter plots, box plots, histograms, fit and confidence plots, and distributions. Author LeRoy Bessler introduces unique creations, including sparsely annotated time series, maximally informative bar charts, better box plots, histograms based on interesting atypical rationales, and much more. The examples use SAS sample data sets as input. Any SAS user can experiment with the code presented to see what else is possible, or adapt it to repurpose the design and apply it with a customized version of that code. What You'll Learn Create graphs that are easily and quickly interpreted, and without ambiguity Supply precise data values that are correct on the graph and correctly associated with the graphic visual elements Take advantage of widely applicable (but not necessarily available elsewhere) design examples Avoid bad practices that are encouraged by poor examples elsewhere Get past sub-optimal designs and results that are built into software defaults Take advantage of less familiar capabilities available in the software Who This Book Is For SAS software users who want to understand their data and/or visually deliver their results
This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of computer science covering topics including mobile computing, security and trust management, multimedia systems and devices, networks and communications, databases and data mining, and ubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy. These proceedings reflect the state-of-the-art in the development of computational methods, numerical simulations, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to computer science.
ISGC 2010, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan, March, 2010. The 2010 symposium brought together prestigious scientists and engineers worldwide to exchange ideas, present challenges/solutions and to discuss new topics in the field of Grid Computing. "Data Driven e-Science: Use Cases and Successful Applications of Distributed Computing Infrastructures (ISGC 2010)," an edited volume, introduces the latest achievements in grid technology for Biomedicine Life Sciences, Middleware, Security, Networking, Digital Library, Cloud Computing and more. This book provides Grid developers and end users with invaluable information for developing grid technology and applications. The last section of this book presents future development in the field of Grid Computing. This book is designed for a professional audience composed of grid users, developers and researchers working in the field of grid computing. Advanced-level students focused on computer science and engineering will also find this book valuable as a reference or secondary text book.
This book examines innovation in the fields of computer engineering and networking, and explores important, state-of-the-art developments in areas such as artificial intelligence, machine learning, information analysis and communication. It gathers papers presented at the 8th International Conference on Computer Engineering and Networks (CENet2018), held in Shanghai, China on August 17-19, 2018. * Explores emerging topics in computer engineering and networking, along with their applications * Discusses how to improve productivity by using the latest advanced technologies * Examines innovation in the fields of computer engineering and networking
This book introduces the theoretical fundamentals for modeling queues in discrete-time, and the basic procedures for developing queuing models in discrete-time. There is a focus on applications in modern telecommunication systems. It presents how most queueing models in discrete-time can be set up as discrete-time Markov chains. Techniques such as matrix-analytic methods (MAM) that can used to analyze the resulting Markov chains are included. This book covers single node systems, tandem system and queueing networks. It shows how queues with time-varying parameters can be analyzed, and illustrates numerical issues associated with computations for the discrete-time queueing systems. Optimal control of queues is also covered. Applied Discrete-Time Queues targets researchers, advanced-level students and analysts in the field of telecommunication networks. It is suitable as a reference book and can also be used as a secondary text book in computer engineering and computer science. Examples and exercises are included.
This unique text/reference provides an overview of crossbar-based interconnection networks, offering novel perspectives on these important components of high-performance, parallel-processor systems. A particular focus is placed on solutions to the blocking and scalability problems. Topics and features: introduces the fundamental concepts in interconnection networks in multi-processor systems, including issues of blocking, scalability, and crossbar networks; presents a classification of interconnection networks, and provides information on recognizing each of the networks; examines the challenges of blocking and scalability, and analyzes the different solutions that have been proposed; reviews a variety of different approaches to improve fault tolerance in multistage interconnection networks; discusses the scalable crossbar network, which is a non-blocking interconnection network that uses small-sized crossbar switches as switching elements. This invaluable work will be of great benefit to students, researchers and practitioners interested in computer networks, parallel processing and reliability engineering. The text is also essential reading for course modules on interconnection network design and reliability.
The book covers a wide range of wireless communication and network technologies, and will help readers understand the role of wireless technologies in applications touching on various spheres of human life, e.g. healthcare, agriculture, building smart cities, forecasting and the manufacturing industry. The book begins by discussing advances in wireless communication, including emerging trends and research directions for network technologies. It also highlights the importance of and need to actively develop these technologies. In turn, the book addresses different algorithms and methodologies which could be beneficial in implementing 5G Mobile Communication, Vehicular Ad-hoc Networks (VANET), Reliable Cooperative Networks, Delay Tolerant Networks (DTN) and many more contexts related to advanced communications. It then addresses the prominence of wireless communication in connection with the Internet of Things (IoT), Mobile Opportunistic Networks and Cognitive Radio Networks (CRN). Lastly, it presents the new horizons in architecture and building protocols for Li-Fi (Light-Fidelity) and Wearable Sensor Technology.
This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms. Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process. In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.
This book provides a general and comprehensible overview of imbalanced learning. It contains a formal description of a problem, and focuses on its main features, and the most relevant proposed solutions. Additionally, it considers the different scenarios in Data Science for which the imbalanced classification can create a real challenge. This book stresses the gap with standard classification tasks by reviewing the case studies and ad-hoc performance metrics that are applied in this area. It also covers the different approaches that have been traditionally applied to address the binary skewed class distribution. Specifically, it reviews cost-sensitive learning, data-level preprocessing methods and algorithm-level solutions, taking also into account those ensemble-learning solutions that embed any of the former alternatives. Furthermore, it focuses on the extension of the problem for multi-class problems, where the former classical methods are no longer to be applied in a straightforward way. This book also focuses on the data intrinsic characteristics that are the main causes which, added to the uneven class distribution, truly hinders the performance of classification algorithms in this scenario. Then, some notes on data reduction are provided in order to understand the advantages related to the use of this type of approaches. Finally this book introduces some novel areas of study that are gathering a deeper attention on the imbalanced data issue. Specifically, it considers the classification of data streams, non-classical classification problems, and the scalability related to Big Data. Examples of software libraries and modules to address imbalanced classification are provided. This book is highly suitable for technical professionals, senior undergraduate and graduate students in the areas of data science, computer science and engineering. It will also be useful for scientists and researchers to gain insight on the current developments in this area of study, as well as future research directions.
This book constitutes the refereed proceedings of the Second International EAI Conference on Emerging Technologies for Developing Countries, AFRICATEK 2018, held in Cotonou, Benin, in May 2018. The 12 revised full papers and 4 short papers were selected from 27 submissions. The papers are organized thematically in tracks, starting with ITS and security, applications and IT services, gaming and user experience.
This book constitutes the refereed proceedings of the 4th EAI International Conference on Industrial Networks and Intelligent Systems, INISCOM 2018, held in Da Nang, Vietnam, in August 2018. The 26 full papers were selected from 38 submissions and are organized thematically in tracks: Telecommunications Systems and Networks; Industrial Networks and Applications; Hardware and Software Design and Development; Information Processing and Data Analysis; Signal Processing; Security and Privacy.
This book develops a crowdsourced sensor-cloud service composition framework taking into account spatio-temporal aspects. This book also unfolds new horizons to service-oriented computing towards the direction of crowdsourced sensor data based applications, in the broader context of Internet of Things (IoT). It is a massive challenge for the IoT research field how to effectively and efficiently capture, manage and deliver sensed data as user-desired services. The outcome of this research will contribute to solving this very important question, by designing a novel service framework and a set of unique service selection and composition frameworks. Delivering a novel service framework to manage crowdsourced sensor data provides high-level abstraction (i.e., sensor-cloud service) to model crowdsourced sensor data from functional and non-functional perspectives, seamlessly turning the raw data into "ready to go" services. A creative indexing model is developed to capture and manage the spatio-temporal dynamism of crowdsourced service providers. Delivering novel frameworks to compose crowdsourced sensor-cloud services is vital. These frameworks focuses on spatio-temporal composition of crowdsourced sensor-cloud services, which is a new territory for existing service oriented computing research. A creative failure-proof model is also designed to prevent composition failure caused by fluctuating QoS. Delivering an incentive model to drive the coverage of crowdsourced service providers is also vital. A new spatio-temporal incentive model targets changing coverage of the crowdsourced providers to achieve demanded coverage of crowdsourced sensor-cloud services within a region. The outcome of this research is expected to potentially create a sensor services crowdsourcing market and new commercial opportunities focusing on crowdsourced data based applications. The crowdsourced community based approach adds significant value to journey planning and map services thus creating a competitive edge for a technologically-minded companies incentivizing new start-ups, thus enabling higher market innovation. This book primarily targets researchers and practitioners, who conduct research work in service oriented computing, Internet of Things (IoT), smart city and spatio-temporal travel planning, as well as advanced-level students studying this field. Small and Medium Entrepreneurs, who invest in crowdsourced IoT services and journey planning infrastructures, will also want to purchase this book.
This book constitutes the refereed proceedings of the 6th IFIP TC 5 International Conference on Computational Intelligence and Its Applications, CIIA 2018, held in Oran, Algeria, in May 2018. The 56 full papers presented were carefully reviewed and selected from 202 submissions. They are organized in the following topical sections: data mining and information retrieval; evolutionary computation; machine learning; optimization; planning and scheduling; wireless communication and mobile computing; Internet of Things (IoT) and decision support systems; pattern recognition and image processing; and semantic web services.
This invaluable text/reference investigates the state of the art in approaches to building, monitoring, managing, and governing smart cities. A particular focus is placed on the distributed computing environments within the infrastructure of such cities, including issues of device connectivity, communication, security, and interoperability. A selection of experts of international repute offer their perspectives on current trends and best practices, and their suggestions for future developments, together with case studies supporting the vision of smart cities based on the Internet of Things (IoT). Topics and features: examines the various methodologies relating to next-level urbanization, including approaches to security and privacy relating to social and legal aspects; describes a recursive and layered approach to modeling large-scale resource management systems for self-sustainable cities; proposes a novel architecture for hybrid vehicular wireless sensor networks, and a pricing mechanism for the management of natural resources; discusses the challenges and potential solutions to building smart city surveillance systems, applying knowledge-based governance, and adopting electric vehicles; covers topics on intelligent distributed systems, IoT, fog computing paradigms, big data management and analytics, and smart grids; reviews issues of sustainability in the design of smart cities and healthcare services, illustrated by case studies taken from cities in Japan, India, and Brazil. This illuminating volume offers a comprehensive reference for researchers investigating smart cities and the IoT, students interested in the distributed computing technologies used by smart living systems, and practitioners wishing to adopt the latest security and connectivity techniques in smart city environments.
This book introduces the concepts, applications and development of data science in the telecommunications industry by focusing on advanced machine learning and data mining methodologies in the wireless networks domain. Mining Over Air describes the problems and their solutions for wireless network performance and quality, device quality readiness and returns analytics, wireless resource usage profiling, network traffic anomaly detection, intelligence-based self-organizing networks, telecom marketing, social influence, and other important applications in the telecom industry. Written by authors who study big data analytics in wireless networks and telecommunication markets from both industrial and academic perspectives, the book targets the pain points in telecommunication networks and markets through big data. Designed for both practitioners and researchers, the book explores the intersection between the development of new engineering technology and uses data from the industry to understand consumer behavior. It combines engineering savvy with insights about human behavior. Engineers will understand how the data generated from the technology can be used to understand the consumer behavior and social scientists will get a better understanding of the data generation process.
This book provides a comprehensive picture of mobile big data starting from data sources to mobile data driven applications. Mobile Big Data comprises two main components: an overview of mobile big data, and the case studies based on real-world data recently collected by one of the largest mobile network carriers in China. In the first component, four areas of mobile big data life cycle are surveyed: data source and collection, transmission, computing platform and applications. In the second component, two case studies are provided, based on the signaling data collected in the cellular core network in terms of subscriber privacy evaluation and demand forecasting for network management. These cases respectively give a vivid demonstration of what mobile big data looks like, and how it can be analyzed and mined to generate useful and meaningful information and knowledge. This book targets researchers, practitioners and professors relevant to this field. Advanced-level students studying computer science and electrical engineering will also be interested in this book as supplemental reading.
This proceedings volume presents selected papers from the 7th International Conference on Emerging Databases: Technologies, Applications, and Theory (EDB 2017), which was held in Busan, Korea from 7 to 9 August, 2017. This conference series was launched by the Korean Institute of Information Scientists and Engineers (KIISE) Database Society of Korea as an annual forum for exploring novel technologies, applications, and research advances in the field of emerging databases. This forum has evolved into the premier international venue for researchers and practitioners to discuss current research issues, challenges, new technologies, and solutions.
This book sheds new light on Transform methods, which dominate the study of linear time-invariant systems in all areas of science and engineering, such as circuit theory, signal/image processing, communications, controls, vibration analysis, remote sensing, biomedical systems, optics and acoustics. It presents Fourier analysis primarily using physical explanations with waveforms and/or examples, only using mathematical formulations to the extent necessary for its practical use. Intended as a textbook for senior undergraduates and graduate level Fourier analysis courses in engineering and science departments, and as a supplementary textbook for a variety of application courses in science and engineering, the book is also a valuable reference for anyone - student or professional - specializing in practical applications of Fourier analysis. The prerequisite for reading this book is a sound understanding of calculus, linear algebra, signals and systems, and programming at the undergraduate level.
This book systematically summarizes the fundamentals and various technologies in both terrestrial radio wireless networks and underwater acoustic networks (UWANs). It addresses the basic issues frequently investigated in terrestrial radio wireless networks and the key technologies suitable for the newly developing research area of UWANs. Starting with a review of our current understanding of wireless networks, it then introduces the principles of the main technologies, including error control, medium access control (MAC) protocols, routing protocols, end-to-end transmission control and mobility issues as well as network security for terrestrial radio wireless networks, and offers detailed surveys of these technologies for UWANs. Providing readers with the basic knowledge of terrestrial radio wireless networking technologies and raising readers' awareness of the developing topic of UWANs in ocean , it is a valuable resource for researchers and practitioners in terrestrial radio wireless networks and UWANs. |
![]() ![]() You may like...
Advances in Communication Systems and…
J. Jayakumari, George K. Karagiannidis, …
Hardcover
R6,077
Discovery Miles 60 770
Advances in Computing and Network…
Sabu M. Thampi, Erol Gelenbe, …
Hardcover
R8,930
Discovery Miles 89 300
Handbook of Integration of Cloud…
Rajiv Ranjan, Karan Mitra, …
Hardcover
R6,434
Discovery Miles 64 340
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R4,316
Discovery Miles 43 160
Advances in Wireless Communications and…
Roumen Kountchev, Aniket Mahanti, …
Hardcover
R4,591
Discovery Miles 45 910
|