![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This book constitutes the thoroughly refereed post-conference proceedings of the First APWeb-WAIM 2018 Workshops, held jointly with the Second International Joint Conference APWeb-WAIM 2018 in Macau, China, in July 2018. The 31 full papers presented were carefully reviewed and selected from 44 submissions. The papers originating from five workshops present cutting-edge ideas, results, experiences, techniques, and tools from all aspects of web data management with the focus on mobile web data analytics; knowledge graph management and analysis; data management and mining on MOOCs; Big data analytics for healthcare; data science.
This book constitutes the refereed conference proceedings of the 12th International Conference on Multi-disciplinary Trends in Artificial Intelligence, MIWAI 2018, held in Hanoi, Vietnam, in November 2018. The 16 full papers presented together with 9 short papers were carefully reviewed and selected from 65 submissions. They are organized in the following topical sections: control, planning and scheduling, pattern recognition, knowledge mining, software applications, strategy games and others.
This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
This book constitutes the proceedings of the 11th International Conference on Internet and Distributed Computing Systems, IDCS 2018, held in Tokyo, Japan, in October 2018. The 21 full papers presented together with 5 poster and 2 short papers in this volume were carefully reviewed and selected from 40 submissions. This conference desired to look for inspiration in diverse areas (e.g., infrastructure and system design, software development, big data, control theory, artificial intelligence, IoT, self-adaptation, emerging models, paradigms, applications and technologies related to Internet-based distributed systems) to develop new ways to design and mange such complex and adaptive computation resources.
This book constitutes the thoroughly refereed proceedings of the 3rd International Conference on IoT as a service, IoTaaS 2017, held in Taichung, Taiwan, in September 2017. The 46 full papers were carefully selected from 65 submissions. The papers deal with the "Everything as a Service" deployment paradigm which enables the easy adoption of IoT based services and applications by end-users, and forces providers of smart objects and middleware platforms to architect their solutions accordingly. The three special sessions organized were Wearable Technology and Applications (WTAA), Building Smart Machine Applications (BSMA), and Security and Privacy in Internet of Things, Services and People (SP-IoTSP). The WTAA special session aimed to address the challenges of maintaining high efficiency of WTAA in terms of high recognition rate, energy consumption, computational costs and so forth. The BSMA special session aimed to explore how to construct smart machines architecture for the industry under the background of IoT and big data. The SP-IoTSP special session aimed to investigate recent research and future directions for IoTSP security and privacy.
This volume constitutes the refereed post-conference proceedings of the Third International Conference on Machine Learning and Intelligent Communications, MLICOM 2018, held in Hangzhou, China, in July 2018. The 66 revised full papers were carefully selected from 102 submissions. The papers are organized thematically in machine learning, intelligent positioning and navigation, intelligent multimedia processing and security, wireless mobile network and security, cognitive radio and intelligent networking, IoT, intelligent satellite communications and networking, green communication and intelligent networking, ad-hoc and sensor networks, resource allocation in wireless and cloud networks, signal processing in wireless and optical communications, and intelligent cooperative communications and networking.
This volume constitutes the proceedings of the 18th Asia Simulation Conference, AsiaSim 2018, held in Kyoto, Japan, in August 2018. The 45 revised full papers presented in this volume were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on modeling and simulation technology; soft computing and machine learning; high performance computing and cloud computing; simulation technology for industry; simulation technology for intelligent society; simulation of instrumentation and control application; computational mathematics and computational science; flow simulation; visualization and computer vision to support simulation.
After the invention of a new mechanical element called 'inerter' in 2002, research interest in passive network synthesis has been revived and this field has again become active and essential.The unique compendium highlights the synthesis of passive electrical or mechanical networks, which is motivated by the vibration control based on a new type of mechanical elements named inerter. It introduces important fundamental concepts of passive network synthesis, and presents recent results on this topic.These new results concern mainly the economical realizations of low-degree functions as RLC networks (damper-spring-inerter networks), the synthesis of n-port resistive networks, and the synthesis of low-complexity mechanical networks. They can be directly applied to the optimization and design of various inerter-based mechanical control systems, such as suspension systems, vibration absorbers, building vibration systems, etc.This useful reference text provides important methodologies and results for researchers in the fields of circuit theory, vibration system control, passive systems, control theory, and electrical engineering.
This book constitutes the revised selected papers from the 6th ECML PKDD Workshop on Data Analytics for Renewable Energy Integration, DARE 2018, held in Dublin, Ireland, in September 2018. The 9 papers presented in this volume were carefully reviewed and selected for inclusion in this book and handle topics such as time series forecasting, the detection of faults, cyber security, smart grid and smart cities, technology integration, demand response, and many others.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.
The four-volume set LNCS 11070, 11071, 11072, and 11073 constitutes the refereed proceedings of the 21st International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2018, held in Granada, Spain, in September 2018. The 373 revised full papers presented were carefully reviewed and selected from 1068 submissions in a double-blind review process. The papers have been organized in the following topical sections: Part I: Image Quality and Artefacts; Image Reconstruction Methods; Machine Learning in Medical Imaging; Statistical Analysis for Medical Imaging; Image Registration Methods. Part II: Optical and Histology Applications: Optical Imaging Applications; Histology Applications; Microscopy Applications; Optical Coherence Tomography and Other Optical Imaging Applications. Cardiac, Chest and Abdominal Applications: Cardiac Imaging Applications: Colorectal, Kidney and Liver Imaging Applications; Lung Imaging Applications; Breast Imaging Applications; Other Abdominal Applications. Part III: Diffusion Tensor Imaging and Functional MRI: Diffusion Tensor Imaging; Diffusion Weighted Imaging; Functional MRI; Human Connectome. Neuroimaging and Brain Segmentation Methods: Neuroimaging; Brain Segmentation Methods. Part IV: Computer Assisted Intervention: Image Guided Interventions and Surgery; Surgical Planning, Simulation and Work Flow Analysis; Visualization and Augmented Reality. Image Segmentation Methods: General Image Segmentation Methods, Measures and Applications; Multi-Organ Segmentation; Abdominal Segmentation Methods; Cardiac Segmentation Methods; Chest, Lung and Spine Segmentation; Other Segmentation Applications.
The four-volume set LNCS 11070, 11071, 11072, and 11073 constitutes the refereed proceedings of the 21st International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2018, held in Granada, Spain, in September 2018. The 373 revised full papers presented were carefully reviewed and selected from 1068 submissions in a double-blind review process. The papers have been organized in the following topical sections: Part I: Image Quality and Artefacts; Image Reconstruction Methods; Machine Learning in Medical Imaging; Statistical Analysis for Medical Imaging; Image Registration Methods. Part II: Optical and Histology Applications: Optical Imaging Applications; Histology Applications; Microscopy Applications; Optical Coherence Tomography and Other Optical Imaging Applications. Cardiac, Chest and Abdominal Applications: Cardiac Imaging Applications: Colorectal, Kidney and Liver Imaging Applications; Lung Imaging Applications; Breast Imaging Applications; Other Abdominal Applications. Part III: Diffusion Tensor Imaging and Functional MRI: Diffusion Tensor Imaging; Diffusion Weighted Imaging; Functional MRI; Human Connectome. Neuroimaging and Brain Segmentation Methods: Neuroimaging; Brain Segmentation Methods. Part IV: Computer Assisted Intervention: Image Guided Interventions and Surgery; Surgical Planning, Simulation and Work Flow Analysis; Visualization and Augmented Reality. Image Segmentation Methods: General Image Segmentation Methods, Measures and Applications; Multi-Organ Segmentation; Abdominal Segmentation Methods; Cardiac Segmentation Methods; Chest, Lung and Spine Segmentation; Other Segmentation Applications.
This book constitutes revised selected papers from the 12th International Conference on Critical Information Infrastructures Security, CRITIS 201, held in Lucca, Italy, in October 2017. The 21 full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. They present innovative research and explore new challenges in the field of critical information infrastructures protection (C(I)IP) and deal with multi-disciplinary approaches to relevant C(I)IP problems.
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.
This book constitutes the refereed proceedings of the 15th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2018, held in Hangzhou, China, in October 2018. The 34 full papers presented in this book together with 15 short papers were carefully reviewed and selected from 75 submissions. The papers cover a broad range of topics in the field of cooperative visualization; cooperative design; cooperative engineering; basic theories, methods and technologies that support CDVE; and cooperative applications.
This book constitutes the refereed proceedings of the 21st International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2018, held in Tokyo, Japan, in October/November 2018. The 27 full papers presented and 31 short papers were carefully reviewed and selected from 103 submissions. PRIMA presents subjects in many application domains, particularly in e-commerce, and also in planning, logistics, manufacturing, robotics, decision support, transportation, entertainment, emergency relief and disaster management, and data mining and analytics.
This double volumes LNCS 11229-11230 constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2018, Ontologies, Databases, and Applications of Semantics, ODBASE 2018, and Cloud and Trusted Computing, C&TC, held as part of OTM 2018 in October 2018 in Valletta, Malta. The 64 full papers presented together with 22 short papers were carefully reviewed and selected from 173 submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, informationsystems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.
This book constitutes the thoroughly refereed proceedings of the 18th International Conference on Transport Systems Telematics, TST 2018, held in Krakow, Poland in March 2018. The 36 full papers presented in this volume were carefully reviewed and selected from 128 submissions. They present and organize the knowledge from within the field of telematics in road transport, in rail transport, in marine transport, in air transport, in logistics.
The three-volume set CCIS 923, CCIS 924, and CCIS 925 constitutes the thoroughly refereed proceedings of the First International Conference on Intelligent Manufacturing and Internet of Things, and of the 5th International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, held in Chongqing, China, in September 2018.The 135 revised full papers presented were carefully reviewed and selected from over 385 submissions.The papers of this volume are organized in topical sections on: clean energy; electric vehicles; energy saving; energy storages; power system analysis.
The three-volume set CCIS 923, CCIS 924, and CCIS 925 constitutes the thoroughly refereed proceedings of the First International Conference on Intelligent Manufacturing and Internet of Things, and of the 5th International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, held in Chongqing, China, in September 2018. The 135 revised full papers presented were carefully reviewed and selected from over 385 submissions.The papers of this volume are organized in topical sections on: digital manufacturing; industrial product design; logistics, production and operation management; manufacturing material; manufacturing optimization; manufacturing process; mechanical transmission system; robotics.
This book provides a comprehensive overview of multiple access techniques used in the cellular industry. The usage of multiple access techniques in telecommunications enables many users to share the same spectrum in the frequency domain, time domain, code domain or phase domain. Licenses are given, by the FCC, to operate wireless communication systems over given bands of frequencies, with the smaller bands, (channels), reused to provide services to other users. Thus, bandwidth efficiency is vital, as the speed and size of digital data networks continue to expand. This brief also uses numerous illustrations to bring students up-to-date in the practical applications of multiple access techniques, which can then be put to work in the industry. Primarily, electrical engineering students who study telecommunications, as well as engineers and designers working in wireless communications, would find this book useful.
This book constitutes the refereed proceedings of the 16th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2018, held in St. Malo, France, in September 2018. The 21 full and 6 short papers plus 2 invited talks presented in this volume were carefully reviewed and selected from 52 submissions. The contributions were organized in topical sections named: on ad-hoc, mobile and wireless sensor, networks and computing.
This timely text/reference presents a comprehensive review of the workflow scheduling algorithms and approaches that are rapidly becoming essential for a range of software applications, due to their ability to efficiently leverage diverse and distributed cloud resources. Particular emphasis is placed on how workflow-based automation in software-defined cloud centers and hybrid IT systems can significantly enhance resource utilization and optimize energy efficiency. Topics and features: describes dynamic workflow and task scheduling techniques that work across multiple (on-premise and off-premise) clouds; presents simulation-based case studies, and details of real-time test bed-based implementations; offers analyses and comparisons of a broad selection of static and dynamic workflow algorithms; examines the considerations for the main parameters in projects limited by budget and time constraints; covers workflow management systems, workflow modeling and simulation techniques, and machine learning approaches for predictive workflow analytics. This must-read work provides invaluable practical insights from three subject matter experts in the cloud paradigm, which will empower IT practitioners and industry professionals in their daily assignments. Researchers and students interested in next-generation software-defined cloud environments will also greatly benefit from the material in the book.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Innovations and Interdisciplinary Solutions for Underserved Areas, InterSol 2018, and the 7th Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2018, held in Kigali, Rwanda, in March 2018. The 23 papers presented were selected from 56 submissions and issue the following themes: papers dealing with the evolution of performances of solar systems in Africa, papers addressing the issues is public health, telecom papers studying the business model of telecommunication, math models presenting the climatic phenomenon and finally health papers dealing with medical devices that are suitable to underserved areas. The proceedings also contain 7 papers from the co-located 7th CNRIA (Collogue National sur la Recherche en Informatique et ses Applications) focusing on network architecture and security, software engineering, data management, and signal processing. |
![]() ![]() You may like...
Smart and Sustainable Collaborative…
Luis M. Camarinha-Matos, Xavier Boucher, …
Hardcover
R6,837
Discovery Miles 68 370
Artificial Intelligence Applications and…
Ilias Maglogiannis, John MacIntyre, …
Hardcover
R3,637
Discovery Miles 36 370
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R4,316
Discovery Miles 43 160
Research and Innovation Forum 2020…
Anna Visvizi, Miltiadis D Lytras, …
Hardcover
R4,726
Discovery Miles 47 260
|