0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (6)
  • R250 - R500 (19)
  • R500+ (4,515)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,583 Discovery Miles 15 830 Ships in 10 - 15 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Critical Infrastructure Protection XV - 15th IFIP WG 11.10 International Conference, ICCIP 2021, Virtual Event, March 15-16,... Critical Infrastructure Protection XV - 15th IFIP WG 11.10 International Conference, ICCIP 2021, Virtual Event, March 15-16, 2021, Revised Selected Papers (Hardcover, 1st ed. 2022)
Jason Staggs, Sujeet Shenoi
R2,055 Discovery Miles 20 550 Ships in 12 - 17 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Industrial Control Systems Security; Telecommunications Systems Security; Infrastructure Security. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of 13 edited papers from the Fifteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held as a virtual event during the spring of 2021. Critical Infrastructure Protection XV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Multi-disciplinary Trends in Artificial Intelligence - 12th International Conference, MIWAI 2018, Hanoi, Vietnam,  November... Multi-disciplinary Trends in Artificial Intelligence - 12th International Conference, MIWAI 2018, Hanoi, Vietnam, November 18-20, 2018, Proceedings (Paperback, 1st ed. 2018)
Manasawee Kaenampornpan, Rainer Malaka, Duc Dung Nguyen, Nicolas Schwind
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 12th International Conference on Multi-disciplinary Trends in Artificial Intelligence, MIWAI 2018, held in Hanoi, Vietnam, in November 2018. The 16 full papers presented together with 9 short papers were carefully reviewed and selected from 65 submissions. They are organized in the following topical sections: control, planning and scheduling, pattern recognition, knowledge mining, software applications, strategy games and others.

Web and Big Data - APWeb-WAIM 2018 International Workshops: MWDA, BAH, KGMA, DMMOOC, DS, Macau, China, July 23-25, 2018,... Web and Big Data - APWeb-WAIM 2018 International Workshops: MWDA, BAH, KGMA, DMMOOC, DS, Macau, China, July 23-25, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Leong-Hou U, Haoran Xie
R1,502 Discovery Miles 15 020 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the First APWeb-WAIM 2018 Workshops, held jointly with the Second International Joint Conference APWeb-WAIM 2018 in Macau, China, in July 2018. The 31 full papers presented were carefully reviewed and selected from 44 submissions. The papers originating from five workshops present cutting-edge ideas, results, experiences, techniques, and tools from all aspects of web data management with the focus on mobile web data analytics; knowledge graph management and analysis; data management and mining on MOOCs; Big data analytics for healthcare; data science.

Internet and Distributed Computing Systems - 11th International Conference, IDCS 2018, Tokyo, Japan, October 11-13, 2018,... Internet and Distributed Computing Systems - 11th International Conference, IDCS 2018, Tokyo, Japan, October 11-13, 2018, Proceedings (Paperback, 1st ed. 2018)
Yang Xiang, Jingtao Sun, Giancarlo Fortino, Antonio Guerrieri, Jason J. Jung
R1,475 Discovery Miles 14 750 Ships in 10 - 15 working days

This book constitutes the proceedings of the 11th International Conference on Internet and Distributed Computing Systems, IDCS 2018, held in Tokyo, Japan, in October 2018. The 21 full papers presented together with 5 poster and 2 short papers in this volume were carefully reviewed and selected from 40 submissions. This conference desired to look for inspiration in diverse areas (e.g., infrastructure and system design, software development, big data, control theory, artificial intelligence, IoT, self-adaptation, emerging models, paradigms, applications and technologies related to Internet-based distributed systems) to develop new ways to design and mange such complex and adaptive computation resources.

Methods and Applications for Modeling and Simulation of Complex Systems - 18th Asia Simulation Conference, AsiaSim 2018, Kyoto,... Methods and Applications for Modeling and Simulation of Complex Systems - 18th Asia Simulation Conference, AsiaSim 2018, Kyoto, Japan, October 27-29, 2018, Proceedings (Paperback, 1st ed. 2018)
Liang Li, Kyoko Hasegawa, Satoshi Tanaka
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 18th Asia Simulation Conference, AsiaSim 2018, held in Kyoto, Japan, in August 2018. The 45 revised full papers presented in this volume were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on modeling and simulation technology; soft computing and machine learning; high performance computing and cloud computing; simulation technology for industry; simulation technology for intelligent society; simulation of instrumentation and control application; computational mathematics and computational science; flow simulation; visualization and computer vision to support simulation.

IoT as a Service - Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20-22, 2017, Proceedings... IoT as a Service - Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20-22, 2017, Proceedings (Paperback, 1st ed. 2018)
Yi-Bing Lin, Der-Jiunn Deng, Ilsun You, Chun-Cheng Lin
R1,504 Discovery Miles 15 040 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 3rd International Conference on IoT as a service, IoTaaS 2017, held in Taichung, Taiwan, in September 2017. The 46 full papers were carefully selected from 65 submissions. The papers deal with the "Everything as a Service" deployment paradigm which enables the easy adoption of IoT based services and applications by end-users, and forces providers of smart objects and middleware platforms to architect their solutions accordingly. The three special sessions organized were Wearable Technology and Applications (WTAA), Building Smart Machine Applications (BSMA), and Security and Privacy in Internet of Things, Services and People (SP-IoTSP). The WTAA special session aimed to address the challenges of maintaining high efficiency of WTAA in terms of high recognition rate, energy consumption, computational costs and so forth. The BSMA special session aimed to explore how to construct smart machines architecture for the industry under the background of IoT and big data. The SP-IoTSP special session aimed to investigate recent research and future directions for IoTSP security and privacy.

Machine Learning and Intelligent Communications - Third International Conference, MLICOM 2018, Hangzhou, China, July 6-8, 2018,... Machine Learning and Intelligent Communications - Third International Conference, MLICOM 2018, Hangzhou, China, July 6-8, 2018, Proceedings (Paperback, 1st ed. 2018)
Limin Meng, Yan Zhang
R1,586 Discovery Miles 15 860 Ships in 10 - 15 working days

This volume constitutes the refereed post-conference proceedings of the Third International Conference on Machine Learning and Intelligent Communications, MLICOM 2018, held in Hangzhou, China, in July 2018. The 66 revised full papers were carefully selected from 102 submissions. The papers are organized thematically in machine learning, intelligent positioning and navigation, intelligent multimedia processing and security, wireless mobile network and security, cognitive radio and intelligent networking, IoT, intelligent satellite communications and networking, green communication and intelligent networking, ad-hoc and sensor networks, resource allocation in wireless and cloud networks, signal processing in wireless and optical communications, and intelligent cooperative communications and networking.

Data Analytics for Renewable Energy Integration. Technologies, Systems and Society - 6th ECML PKDD Workshop, DARE 2018, Dublin,... Data Analytics for Renewable Energy Integration. Technologies, Systems and Society - 6th ECML PKDD Workshop, DARE 2018, Dublin, Ireland, September 10, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Wei Lee Woon, Zeyar Aung, Alejandro Catalina Feliu, Stuart Madnick
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the revised selected papers from the 6th ECML PKDD Workshop on Data Analytics for Renewable Energy Integration, DARE 2018, held in Dublin, Ireland, in September 2018. The 9 papers presented in this volume were carefully reviewed and selected for inclusion in this book and handle topics such as time series forecasting, the detection of faults, cyber security, smart grid and smart cities, technology integration, demand response, and many others.

Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January... Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papers (Hardcover)
Gilbert Peterson, Sujeet Shenoi
R1,503 Discovery Miles 15 030 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics VII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Fraud and Malware Investigations, Network Forensics, and Advanced Forensic Techniques. This book is the 7th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of 21 edited papers from the 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2011. Advances in Digital Forensics VII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Medical Image Computing and Computer Assisted Intervention - MICCAI 2018 - 21st International Conference, Granada, Spain,... Medical Image Computing and Computer Assisted Intervention - MICCAI 2018 - 21st International Conference, Granada, Spain, September 16-20, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Alejandro F. Frangi, Julia A. Schnabel, Christos Davatzikos, Carlos Alberola Lopez, Gabor Fichtinger
R3,233 Discovery Miles 32 330 Ships in 10 - 15 working days

The four-volume set LNCS 11070, 11071, 11072, and 11073 constitutes the refereed proceedings of the 21st International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2018, held in Granada, Spain, in September 2018. The 373 revised full papers presented were carefully reviewed and selected from 1068 submissions in a double-blind review process. The papers have been organized in the following topical sections: Part I: Image Quality and Artefacts; Image Reconstruction Methods; Machine Learning in Medical Imaging; Statistical Analysis for Medical Imaging; Image Registration Methods. Part II: Optical and Histology Applications: Optical Imaging Applications; Histology Applications; Microscopy Applications; Optical Coherence Tomography and Other Optical Imaging Applications. Cardiac, Chest and Abdominal Applications: Cardiac Imaging Applications: Colorectal, Kidney and Liver Imaging Applications; Lung Imaging Applications; Breast Imaging Applications; Other Abdominal Applications. Part III: Diffusion Tensor Imaging and Functional MRI: Diffusion Tensor Imaging; Diffusion Weighted Imaging; Functional MRI; Human Connectome. Neuroimaging and Brain Segmentation Methods: Neuroimaging; Brain Segmentation Methods. Part IV: Computer Assisted Intervention: Image Guided Interventions and Surgery; Surgical Planning, Simulation and Work Flow Analysis; Visualization and Augmented Reality. Image Segmentation Methods: General Image Segmentation Methods, Measures and Applications; Multi-Organ Segmentation; Abdominal Segmentation Methods; Cardiac Segmentation Methods; Chest, Lung and Spine Segmentation; Other Segmentation Applications.

Medical Image Computing and Computer Assisted Intervention - MICCAI 2018 - 21st International Conference, Granada, Spain,... Medical Image Computing and Computer Assisted Intervention - MICCAI 2018 - 21st International Conference, Granada, Spain, September 16-20, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Alejandro F. Frangi, Julia A. Schnabel, Christos Davatzikos, Carlos Alberola Lopez, Gabor Fichtinger
R2,974 Discovery Miles 29 740 Ships in 10 - 15 working days

The four-volume set LNCS 11070, 11071, 11072, and 11073 constitutes the refereed proceedings of the 21st International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2018, held in Granada, Spain, in September 2018. The 373 revised full papers presented were carefully reviewed and selected from 1068 submissions in a double-blind review process. The papers have been organized in the following topical sections: Part I: Image Quality and Artefacts; Image Reconstruction Methods; Machine Learning in Medical Imaging; Statistical Analysis for Medical Imaging; Image Registration Methods. Part II: Optical and Histology Applications: Optical Imaging Applications; Histology Applications; Microscopy Applications; Optical Coherence Tomography and Other Optical Imaging Applications. Cardiac, Chest and Abdominal Applications: Cardiac Imaging Applications: Colorectal, Kidney and Liver Imaging Applications; Lung Imaging Applications; Breast Imaging Applications; Other Abdominal Applications. Part III: Diffusion Tensor Imaging and Functional MRI: Diffusion Tensor Imaging; Diffusion Weighted Imaging; Functional MRI; Human Connectome. Neuroimaging and Brain Segmentation Methods: Neuroimaging; Brain Segmentation Methods. Part IV: Computer Assisted Intervention: Image Guided Interventions and Surgery; Surgical Planning, Simulation and Work Flow Analysis; Visualization and Augmented Reality. Image Segmentation Methods: General Image Segmentation Methods, Measures and Applications; Multi-Organ Segmentation; Abdominal Segmentation Methods; Cardiac Segmentation Methods; Chest, Lung and Spine Segmentation; Other Segmentation Applications.

Building Automation - Communication systems with EIB/KNX, LON and BACnet (Paperback, Softcover reprint of the original 2nd ed.... Building Automation - Communication systems with EIB/KNX, LON and BACnet (Paperback, Softcover reprint of the original 2nd ed. 2018)
James Backer; Hermann Merz; Translated by Viktoriya Moser; Thomas Hansemann; Translated by Leena Greefe; …
R3,036 Discovery Miles 30 360 Ships in 10 - 15 working days

This book offers all important industrial communication systems for buildings in one single book! It stimulates a basic understanding of network and bus systems for the automation of buildings. After an introduction to EIB/KNX, LON und BACnet technologies, the authors illustrate how these systems can be utilized for specific applications, like air conditioning or illumination. This book assumes only a basic knowledge of mathematics and thanks to its simple explanations and many examples is ideal for students and professional engineers who require practical solutions. Numerous practical examples explain basic concepts of industrial communication technology as well as the procedure for the transmission of digital data. All chapters have been thoroughly revised for the 2nd edition and the book includes the latest technical developments and standards.

PRIMA 2018: Principles and Practice of Multi-Agent Systems - 21st International Conference, Tokyo, Japan, October 29-November... PRIMA 2018: Principles and Practice of Multi-Agent Systems - 21st International Conference, Tokyo, Japan, October 29-November 2, 2018, Proceedings (Paperback, 1st ed. 2018)
Tim Miller, Nir Oren, Yuko Sakurai, Itsuki Noda, Bastin Tony Roy Savarimuthu, …
R1,587 Discovery Miles 15 870 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 21st International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2018, held in Tokyo, Japan, in October/November 2018. The 27 full papers presented and 31 short papers were carefully reviewed and selected from 103 submissions. PRIMA presents subjects in many application domains, particularly in e-commerce, and also in planning, logistics, manufacturing, robotics, decision support, transportation, entertainment, emergency relief and disaster management, and data mining and analytics.

Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September... Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings (Paperback, 1st ed. 2018)
Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis
R2,675 Discovery Miles 26 750 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.

Cooperative Design, Visualization, and Engineering - 15th International Conference, CDVE 2018, Hangzhou, China, October 21-24,... Cooperative Design, Visualization, and Engineering - 15th International Conference, CDVE 2018, Hangzhou, China, October 21-24, 2018, Proceedings (Paperback, 1st ed. 2018)
Yuhua Luo
R1,487 Discovery Miles 14 870 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2018, held in Hangzhou, China, in October 2018. The 34 full papers presented in this book together with 15 short papers were carefully reviewed and selected from 75 submissions. The papers cover a broad range of topics in the field of cooperative visualization; cooperative design; cooperative engineering; basic theories, methods and technologies that support CDVE; and cooperative applications.

On the Move to Meaningful Internet Systems. OTM 2018 Conferences - Confederated International Conferences: CoopIS, C&TC, and... On the Move to Meaningful Internet Systems. OTM 2018 Conferences - Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Herve Panetto, Christophe Debruyne, Henderik A. Proper, Claudio Agostino Ardagna, Dumitru Roman, …
R1,592 Discovery Miles 15 920 Ships in 10 - 15 working days

This double volumes LNCS 11229-11230 constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2018, Ontologies, Databases, and Applications of Semantics, ODBASE 2018, and Cloud and Trusted Computing, C&TC, held as part of OTM 2018 in October 2018 in Valletta, Malta. The 64 full papers presented together with 22 short papers were carefully reviewed and selected from 173 submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, informationsystems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.

Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017,... Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Gregorio D'Agostino, Antonio Scala
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 12th International Conference on Critical Information Infrastructures Security, CRITIS 201, held in Lucca, Italy, in October 2017. The 21 full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. They present innovative research and explore new challenges in the field of critical information infrastructures protection (C(I)IP) and deal with multi-disciplinary approaches to relevant C(I)IP problems.

Intelligent Computing and Internet of Things - First International Conference on Intelligent Manufacturing and Internet of... Intelligent Computing and Internet of Things - First International Conference on Intelligent Manufacturing and Internet of Things and 5th International Conference on Computing for Sustainable Energy and Environment, IMIOT and ICSEE 2018, Chongqing, China, September 21-23, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Kang Li, Minrui Fei, Dajun Du, Zhile Yang, Dongsheng Yang
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days

The three-volume set CCIS 923, CCIS 924, and CCIS 925 constitutes the thoroughly refereed proceedings of the First International Conference on Intelligent Manufacturing and Internet of Things, and of the 5th International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, held in Chongqing, China, in September 2018. The 135 revised full papers presented were carefully reviewed and selected from over 385 submissions.The papers of this volume are organized in topical sections on: digital manufacturing; industrial product design; logistics, production and operation management; manufacturing material; manufacturing optimization; manufacturing process; mechanical transmission system; robotics.

Radio Frequency Multiple Access Techniques Made Easy (Paperback, 1st ed. 2019): Saleh Faruque Radio Frequency Multiple Access Techniques Made Easy (Paperback, 1st ed. 2019)
Saleh Faruque
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book provides a comprehensive overview of multiple access techniques used in the cellular industry. The usage of multiple access techniques in telecommunications enables many users to share the same spectrum in the frequency domain, time domain, code domain or phase domain. Licenses are given, by the FCC, to operate wireless communication systems over given bands of frequencies, with the smaller bands, (channels), reused to provide services to other users. Thus, bandwidth efficiency is vital, as the speed and size of digital data networks continue to expand. This brief also uses numerous illustrations to bring students up-to-date in the practical applications of multiple access techniques, which can then be put to work in the industry. Primarily, electrical engineering students who study telecommunications, as well as engineers and designers working in wireless communications, would find this book useful.

Advances in Green Energy Systems and Smart Grid - First International Conference on Intelligent Manufacturing and Internet of... Advances in Green Energy Systems and Smart Grid - First International Conference on Intelligent Manufacturing and Internet of Things and 5th International Conference on Computing for Sustainable Energy and Environment, IMIOT and ICSEE 2018, Chongqing, China, September 21-23, 2018, Proceedings, Part III (Paperback, 1st ed. 2018)
Kang Li, Jianhua Zhang, Minyou Chen, Zhile Yang, Qun Niu
R1,486 Discovery Miles 14 860 Ships in 10 - 15 working days

The three-volume set CCIS 923, CCIS 924, and CCIS 925 constitutes the thoroughly refereed proceedings of the First International Conference on Intelligent Manufacturing and Internet of Things, and of the 5th International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, held in Chongqing, China, in September 2018.The 135 revised full papers presented were carefully reviewed and selected from over 385 submissions.The papers of this volume are organized in topical sections on: clean energy; electric vehicles; energy saving; energy storages; power system analysis.

Management Perspective for Transport Telematics - 18th International Conference on Transport System Telematics, TST 2018,... Management Perspective for Transport Telematics - 18th International Conference on Transport System Telematics, TST 2018, Krakow, Poland, March 20-23, 2018, Selected Papers (Paperback, 1st ed. 2018)
Jerzy Mikulski
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 18th International Conference on Transport Systems Telematics, TST 2018, held in Krakow, Poland in March 2018. The 36 full papers presented in this volume were carefully reviewed and selected from 128 submissions. They present and organize the knowledge from within the field of telematics in road transport, in rail transport, in marine transport, in air transport, in logistics.

Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018,... Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings (Paperback, 1st ed. 2018)
Chunhua Su, Hiroaki Kikuchi
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Information Technology in Disaster Risk…
Yuko Murayama, Dimiter Velev, … Hardcover R2,830 Discovery Miles 28 300
Advances in Wireless Communications and…
Roumen Kountchev, Aniket Mahanti, … Hardcover R4,250 Discovery Miles 42 500
Reconfigurable Intelligent…
Hongliang Zhang, Boya Di, … Hardcover R4,586 Discovery Miles 45 860
Handbook of Computer Networks and Cyber…
Brij B. Gupta, Gregorio Martinez Perez, … Hardcover R7,228 Discovery Miles 72 280
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, … Hardcover R3,937 Discovery Miles 39 370
Blockchain Cybersecurity, Trust and…
Kim-Kwang Raymond Choo, Ali Dehghantanha, … Hardcover R4,589 Discovery Miles 45 890
Algorithms for Data and Computation…
Alex X. Liu, Rui Li Hardcover R3,643 Discovery Miles 36 430
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, … Hardcover R3,259 Discovery Miles 32 590
6G Mobile Wireless Networks
Yulei Wu, Sukhdeep Singh, … Hardcover R4,610 Discovery Miles 46 100
5G and Beyond - Fundamentals and…
Xingqin Lin, Namyoon Lee Hardcover R4,618 Discovery Miles 46 180

 

Partners