![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This book (CCIS 837) constitutes the refereed proceedings of the Second International Conference on Soft Computing Systems, ICSCS 2018, held in Sasthamcotta, India, in April 2018. The 87 full papers were carefully reviewed and selected from 439 submissions. The papers are organized in topical sections on soft computing, evolutionary algorithms, image processing, deep learning, artificial intelligence, big data analytics, data minimg, machine learning, VLSI, cloud computing, network communication, power electronics, green energy.
This book constitutes the refereed proceedings of the 21st International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2018, held in Tokyo, Japan, in October/November 2018. The 27 full papers presented and 31 short papers were carefully reviewed and selected from 103 submissions. PRIMA presents subjects in many application domains, particularly in e-commerce, and also in planning, logistics, manufacturing, robotics, decision support, transportation, entertainment, emergency relief and disaster management, and data mining and analytics.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.
The three-volume set CCIS 923, CCIS 924, and CCIS 925 constitutes the thoroughly refereed proceedings of the First International Conference on Intelligent Manufacturing and Internet of Things, and of the 5th International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, held in Chongqing, China, in September 2018.The 135 revised full papers presented were carefully reviewed and selected from over 385 submissions.The papers of this volume are organized in topical sections on: clean energy; electric vehicles; energy saving; energy storages; power system analysis.
This book constitutes the thoroughly refereed proceedings of the 18th International Conference on Transport Systems Telematics, TST 2018, held in Krakow, Poland in March 2018. The 36 full papers presented in this volume were carefully reviewed and selected from 128 submissions. They present and organize the knowledge from within the field of telematics in road transport, in rail transport, in marine transport, in air transport, in logistics.
The three-volume set CCIS 923, CCIS 924, and CCIS 925 constitutes the thoroughly refereed proceedings of the First International Conference on Intelligent Manufacturing and Internet of Things, and of the 5th International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, held in Chongqing, China, in September 2018. The 135 revised full papers presented were carefully reviewed and selected from over 385 submissions.The papers of this volume are organized in topical sections on: digital manufacturing; industrial product design; logistics, production and operation management; manufacturing material; manufacturing optimization; manufacturing process; mechanical transmission system; robotics.
This book provides a comprehensive overview of multiple access techniques used in the cellular industry. The usage of multiple access techniques in telecommunications enables many users to share the same spectrum in the frequency domain, time domain, code domain or phase domain. Licenses are given, by the FCC, to operate wireless communication systems over given bands of frequencies, with the smaller bands, (channels), reused to provide services to other users. Thus, bandwidth efficiency is vital, as the speed and size of digital data networks continue to expand. This brief also uses numerous illustrations to bring students up-to-date in the practical applications of multiple access techniques, which can then be put to work in the industry. Primarily, electrical engineering students who study telecommunications, as well as engineers and designers working in wireless communications, would find this book useful.
The six volumes LNCS 11619-11624 constitute the refereed proceedings of the 19th International Conference on Computational Science and Its Applications, ICCSA 2019, held in Saint Petersburg, Russia, in July 2019. The 64 full papers, 10 short papers and 259 workshop papers presented were carefully reviewed and selected form numerous submissions. The 64 full papers are organized in the following five general tracks: computational methods, algorithms and scientific applications; high performance computing and networks; geometric modeling, graphics and visualization; advanced and emerging applications; and information systems and technologies. The 259 workshop papers were presented at 33 workshops in various areas of computational sciences, ranging from computational science technologies to specific areas of computational sciences, such as software engineering, security, artificial intelligence and blockchain technologies.
This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2019, held in Rabat, Morocco, in July 2019. The 22 papers presented in this book were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on protocols; post-quantum cryptography; zero-knowledge; lattice based cryptography; new schemes and analysis; block ciphers; side-channel attacks and countermeasures; signatures. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).
This book constitutes the refereed post-conference proceedings of the Second International Conference on Innovations and Interdisciplinary Solutions for Underserved Areas, InterSol 2018, and the 7th Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2018, held in Kigali, Rwanda, in March 2018. The 23 papers presented were selected from 56 submissions and issue the following themes: papers dealing with the evolution of performances of solar systems in Africa, papers addressing the issues is public health, telecom papers studying the business model of telecommunication, math models presenting the climatic phenomenon and finally health papers dealing with medical devices that are suitable to underserved areas. The proceedings also contain 7 papers from the co-located 7th CNRIA (Collogue National sur la Recherche en Informatique et ses Applications) focusing on network architecture and security, software engineering, data management, and signal processing.
This book constitutes the proceedings of the 20th International Conference on Speech and Computer, SPECOM 2018, held in Leipzig, Germany, in September 2018. The 79 papers presented in this volume were carefully reviewed and selected from 132 submissions. The papers present current research in the area of computer speech processing, including recognition, synthesis, understanding and related domains like signal processing, language and text processing, computational paralinguistics, multi-modal speech processing or human-computer interaction.
This book constitutes the refereed proceedings of the 5th International Conference on Belief Functions, BELIEF 2018, held in Compiegne, France, in September 2018.The 33 revised regular papers presented in this book were carefully selected and reviewed from 73 submissions. The papers were solicited on theoretical aspects (including for example statistical inference, mathematical foundations, continuous belief functions) as well as on applications in various areas including classification, statistics, data fusion, network analysis and intelligent vehicles.
This book constitutes the refereed proceedings of the 21th International Conference on Distributed and Computer and Communication Networks, DCCN 2018, held in Moscow, Russia, in September 2018. The 50 full papers and the 9 short papers were carefully reviewed and selected from 168 submissions. The papers cover the following topics: computer and communication networks architecture optimization; control in computer and communication networks; performance and QoS/QoE evaluation in wireless networks; analytical modeling and simulation of next-generation communications systems; queueing theory and reliability theory applications in computer networks; wireless 4G/5G networks, cm- and mm-wave radio technologies; RFID technology and its application in intellectual transportation networks; Internet of Things, wearables, and applications of distributed information systems; probabilistic and statistical models in information systems; mathematical modeling of high-tech systems; mathematical modeling and control problems; distributed and cloud computing systems, big data analytics.
This two-volume set LNICST 286-287 constitutes the post-conference proceedings of the First EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2019, held in Harbin, China, in May 2019. The 93 full papers were carefully reviewed and selected from 152 submissions. The papers are organized in topical sections on artificial intelligence, mobile network, deep learning, machine learning, wireless communication, cognitive radio, internet of things, big data, communication system, pattern recognition, channel model, beamforming, signal processing, 5G, mobile management, resource management, wireless position.
This book constitutes the refereed proceedings of the 10th International Conference on Reversible Computation, RC 2018, held in Leicester, UK, in September 2018. The 13 full, 7 short, and one tutorial papers included in this volume together with four invited talks were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: reversible concurrent computation; quantum circuits; reversible programming languages; and applications.
This volume constitutes the proceedings of the 26th International Conference on Web Services, ICWS 2019, held as part of SCF 2019 in San Diego, CA, USA in June 2019. The 11 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 31 submissions. ICWS has been a prime international forum for both researchers and industry practitioners to exchange the latest fundamental advances in the state of the art and practice of Web-based services, to identify emerging research topics, and to define the future of Web-based services. Topics include Internet services modeling, discovery, composition, testing, adaptation, delivery, as well as standards.
This two volume set of LNAI 11061 and LNAI 11062 constitutes the refereed proceedings of the 11th International Conference on Knowledge Science, Engineering and Management, KSEM 2018, held in Changchun, China, in August 2018. The 62 revised full papers and 26 short papers presented were carefully reviewed and selected from 262 submissions. The papers of the first volume are organized in the following topical sections: text mining and document analysis; image and video data analysis; data processing and data mining; recommendation algorithms and systems; probabilistic models and applications; knowledge engineering applications; and knowledge graph and knowledge management. The papers of the second volume are organized in the following topical sections: constraints and satisfiability; formal reasoning and ontologies; deep learning; network knowledge representation and learning; and social knowledge analysis and management.
Melanie Holloway explores a cloud broker offering service level agreement negotiation and monitoring as a service to consumers. She proposes a negotiation mechanism, which enables the achievement of economically efficient agreements, and an approach for reliable consumer side availability monitoring in conjunction with strategies for robust monitor placement. The author addresses the loss of control of consumers over critical aspects, specifically quality of service, when using services from the cloud.Basically, the cloud computing paradigm places the responsibility for resource management on the provider side. Hence, the control over cloud service performance is very limited on the consumer side.
This book constitutes the joint refereed proceedings of the 18th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2018, the 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018. The 64 revised full papers presented were carefully reviewed and selected from 186 submissions. The papers of NEW2AN focus on advanced wireless networking and applications; lower-layer communication enablers; novel and innovative approaches to performance and efficiency analysis of ad-hoc and machine-type systems; employed game-theoretical formulations, Markov chain models, and advanced queuing theory; grapheme and other emerging material, photonics and optics; generation and processing of signals; and business aspects. The ruSMART papers deal with fully-customized applications and services.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Mobile, Secure and Programmable Networking, held in Mohammedia, Morocco, in April 2019. The 23 papers presented in this volume were carefully reviewed and selected from 48 submissions. They discuss new trends in networking infrastructures, security, services and applications while focusing on virtualization and cloud computing for networks, network programming, software defined networks (SDN) and their security.
This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019. The 43 full and 11 short papers presented were carefully reviewed and selected from 143 submissions. The papers deal with new ideas and recent advances in computer systems, wireless networks, distributed applications, and advanced algorithms that are pushing forward the new technologies for better information sharing, computer communication, and universal connected devices in various environments, especially in wireless networks.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics VII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Fraud and Malware Investigations, Network Forensics, and Advanced Forensic Techniques. This book is the 7th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of 21 edited papers from the 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2011. Advances in Digital Forensics VII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.
Transform your IT organization from one weighed down by set practices to one with a DevOps culture and a cloud-first strategy that is optimized by automation and other lean practices. In this engaging read, you will discover the opportunities, challenges, lessons, and rewards that CA Technologies encountered when making their agile and DevOps transformation. In Enterprise DevOps Framework author Shamayel Farooqui shows you how agile adoption will enable your organization to stay ahead in an ever-changing business environment and meet your customers' needs. He includes detailed references to key concepts such as agile, hybrid and cloud technology, infrastructure management, and process automation. What You'll Learn Establish the focus areas for your IT organization Prepare for the challenges of transforming your enterprise to a DevOps, agile organization Know the key steps for executing an enterprise DevOps strategy Build a strong team of DevOps individuals focused on improving the efficiency of your organization through Agile methodologies, automation, cloud adoption, and "infrastructure as code" practices Who This Book Is For IT administrators, operational personnel, cloud professionals, DevOps professionals, human resources professionals, managers, and C-level staff
This two-volume set (LNAI 11055 and LNAI 11056) constitutes the refereed proceedings of the 10th International Conference on Collective Intelligence, ICCCI 2018, held in Bristol, UK, in September 2018 The 98 full papers presented were carefully reviewed and selected from 240 submissions. The conference focuses on knowledge engineering and semantic web, social network analysis, recommendation methods and recommender systems, agents and multi-agent systems, text processing and information retrieval, data mining methods and applications, decision support and control systems, sensor networks and internet of things, as well as computer vision techniques.
This book constitutes the refereed proceedings of the 10th International ICT Innovations Conference, ICT Innovations 2018, held in Ohrid, Macedonia, in September 2018.The 21 full papers presented were carefully reviewed and selected from 81 submissions. They cover the following topics:sensor applications and deployments, embedded and cyber-physical systems, robotics, network architectures, cloud computing, software infrastructure, software creation and management, models of computation, computational complexity and cryptography, design and analysis of algorithms, mathematical optimization, probability and statistics, data management systems, data mining, human computer interaction (HCI), artificial intelligence, machine learning, life and medical sciences, health care information systems, bioinformatics. |
![]() ![]() You may like...
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, …
Hardcover
R2,640
Discovery Miles 26 400
Handbook of Integration of Cloud…
Rajiv Ranjan, Karan Mitra, …
Hardcover
R6,309
Discovery Miles 63 090
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, …
Hardcover
R3,543
Discovery Miles 35 430
Advances in Wireless Communications and…
Roumen Kountchev, Aniket Mahanti, …
Hardcover
R4,370
Discovery Miles 43 700
Advances in Computing and Network…
Sabu M. Thampi, Erol Gelenbe, …
Hardcover
R8,756
Discovery Miles 87 560
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R4,233
Discovery Miles 42 330
|