![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This book explores how social media and its advances enables citizens to empower themselves during a crisis. The book addresses the key issues related to crises management and social media as the new platform to assist citizens and first responders dealing with multiple forms of crisis, from major terrorist attacks, larger scale public disorder, large-scale movement of people across borders, and natural disasters. The book is based on the results and knowledge gained during the European Commission ATHENA project which has been addressing critical issues in contemporary crisis management and social media and smart mobile communications. This book is authored by a mix of global contributors from across the landscape of academia, emergency response and experts in government policy and private industry. This title explores and explains that during a modern crisis, the public self-organizes into voluntary groups, adapt quickly to changing circumstances, emerge as leaders and experts and perform life-saving actions; and that they are increasingly reliant upon the use of new communications media to do it.
This two-volume set (CCIS 873 and CCIS 874) constitutes the thoroughly refereed proceedings of the 9th International Symposium, ISICA 2017, held in Guangzhou, China, in November 2017. The 101 full papers presented in both volumes were carefully reviewed and selected from 181 submissions. This second volume is organized in topical sections on swarm intelligence: cooperative Search, swarm optimization; complex systems modeling: system dynamic, multimedia simulation; intelligent information systems: information retrieval, e-commerce platforms; artificial intelligence and robotics: query optimization, intelligent engineering; virtualization: motion-based tracking, image recognition.
This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve what you cannot measure", a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.
This two volume set (CCIS 901 and 902) constitutes the refereed proceedings of the 4th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2018 (originally ICYCSEE) held in Zhengzhou, China, in September 2018. The 125 revised full papers presented in these two volumes were carefully reviewed and selected from 1057 submissions. The papers cover a wide range of topics related to basic theory and techniques for data science including mathematical issues in data science, computational theory for data science, big data management and applications, data quality and data preparation, evaluation and measurement in data science, data visualization, big data mining and knowledge management, infrastructure for data science, machine learning for data science, data security and privacy, applications of data science, case study of data science, multimedia data management and analysis, data-driven scientific research, data-driven bioinformatics, data-driven healthcare, data-driven management, data-driven eGovernment, data-driven smart city/planet, data marketing and economics, social media and recommendation systems, data-driven security, data-driven business model innovation, social and/or organizational impacts of data science.
This book provides formal and informal definitions and taxonomies for self-aware computing systems, and explains how self-aware computing relates to many existing subfields of computer science, especially software engineering. It describes architectures and algorithms for self-aware systems as well as the benefits and pitfalls of self-awareness, and reviews much of the latest relevant research across a wide array of disciplines, including open research challenges. The chapters of this book are organized into five parts: Introduction, System Architectures, Methods and Algorithms, Applications and Case Studies, and Outlook. Part I offers an introduction that defines self-aware computing systems from multiple perspectives, and establishes a formal definition, a taxonomy and a set of reference scenarios that help to unify the remaining chapters. Next, Part II explores architectures for self-aware computing systems, such as generic concepts and notations that allow a wide range of self-aware system architectures to be described and compared with both isolated and interacting systems. It also reviews the current state of reference architectures, architectural frameworks, and languages for self-aware systems. Part III focuses on methods and algorithms for self-aware computing systems by addressing issues pertaining to system design, like modeling, synthesis and verification. It also examines topics such as adaptation, benchmarks and metrics. Part IV then presents applications and case studies in various domains including cloud computing, data centers, cyber-physical systems, and the degree to which self-aware computing approaches have been adopted within those domains. Lastly, Part V surveys open challenges and future research directions for self-aware computing systems. It can be used as a handbook for professionals and researchers working in areas related to self-aware computing, and can also serve as an advanced textbook for lecturers and postgraduate students studying subjects like advanced software engineering, autonomic computing, self-adaptive systems, and data-center resource management. Each chapter is largely self-contained, and offers plenty of references for anyone wishing to pursue the topic more deeply.
This book intends to change the perception of modern day telecommunications. Communication systems, usually perceived as "dumb pipes", carrying information / data from one point to another, are evolved into intelligently communicating smart systems. The book introduces a new field of cloud communications. The concept, theory, and architecture of this new field of cloud communications are discussed. The book lays down nine design postulates that form the basis of the development of a first of its kind cloud communication paradigm entitled Green Symbiotic Cloud Communications or GSCC. The proposed design postulates are formulated in a generic way to form the backbone for development of systems and technologies of the future. The book can be used to develop courses that serve as an essential part of graduate curriculum in computer science and electrical engineering. Such courses can be independent or part of high-level research courses. The book will also be of interest to a wide range of readers including both scientific and non-scientific domains as it discusses innovations from a simplistic explanatory viewpoint.
This book constitutes the proceedings of the 17th International Conference on Web-Based Learning, ICWL 2018, held in Chiang Mai, Thailand, in August 2018.The 11 revised full papers presented together with 4 short papers were carefully reviewed and selected from 37 submissions. The papers are organized in topical sections on learning assessment and behavior; case studies; augmented reality and collaborative learning; game-based learning; and learning content management and experience sharing.
This authoritative text/reference describes the state of the art in requirements engineering for software systems for distributed computing. A particular focus is placed on integrated solutions, which take into account the requirements of scalability, flexibility, sustainability and operability for distributed environments. Topics and features: discusses the latest developments, tools, technologies and trends in software requirements engineering; reviews the relevant theoretical frameworks, practical approaches and methodologies for service requirements; examines the three key components of the requirements engineering process, namely requirements elicitation, requirements specification, and requirements validation and evaluation; presents detailed contributions from an international selection of highly reputed experts in the field; offers guidance on best practices, and suggests directions for further research in the area.
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software systems, and the Internet of Things has become a crucial aspect of the performance of computer systems. The papers deal with these issues, with a specific focus on societally critical systems such as health informatics systems, the Internet of Things, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures.
This book (CCIS 899) constitutes the refereed proceedings of the First International Conference on Applications of Computing and Communication Technologies, ICACCT 2018, held in Delhi, India, in March 2018. The 30 full papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on communication and system technologies, computing and network technologies, application and services.
This timely text/reference presents a comprehensive review of the workflow scheduling algorithms and approaches that are rapidly becoming essential for a range of software applications, due to their ability to efficiently leverage diverse and distributed cloud resources. Particular emphasis is placed on how workflow-based automation in software-defined cloud centers and hybrid IT systems can significantly enhance resource utilization and optimize energy efficiency. Topics and features: describes dynamic workflow and task scheduling techniques that work across multiple (on-premise and off-premise) clouds; presents simulation-based case studies, and details of real-time test bed-based implementations; offers analyses and comparisons of a broad selection of static and dynamic workflow algorithms; examines the considerations for the main parameters in projects limited by budget and time constraints; covers workflow management systems, workflow modeling and simulation techniques, and machine learning approaches for predictive workflow analytics. This must-read work provides invaluable practical insights from three subject matter experts in the cloud paradigm, which will empower IT practitioners and industry professionals in their daily assignments. Researchers and students interested in next-generation software-defined cloud environments will also greatly benefit from the material in the book.
This book constitutes the revised selected papers from the First International Conference on Computing, Analytics and Networks, ICAN 2017, held in Rajpura, India, in October 2017.The 20 revised full papers presented in this volume were carefully reviewed and selected from 56 submissions. They are organized in topical sections on Mobile Cloud Computing; Big Data Analytics; Secure Networks. Five papers in this book are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. For further details, please see the copyright page.
This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature.A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle-to-infrastructure communications.This book offers useful insights into protocol design and inspires a new line of thinking in performance improvements for safety applications in vehicular networks. It is a valuable resource for professionals, researchers, or advanced-level students working in vehicular networks or quality of service.
This two-volume set LNCS 10954 and LNCS 10955 constitutes - in conjunction with the volume LNAI 10956 - the refereed proceedings of the 14th International Conference on Intelligent Computing, ICIC 2018, held in Wuhan, China, in August 2018. The 275 full papers and 72 short papers of the three proceedings volumes were carefully reviewed and selected from 632 submissions. The papers are organized in topical sections such as Neural Networks.- Pattern Recognition.- Image Processing.- Intelligent Computing in Robotics.- Intelligent Control and Automation.- Intelligent Data Analysis and Prediction.- Fuzzy Theory and Algorithms.- Supervised Learning.- Unsupervised Learning.- Kernel Methods and Supporting Vector Machines.- Knowledge Discovery and Data Mining.- Natural Language Processing and Computational Linguistics.- Gene Expression Array Analysis.- Systems Biology.- Computational Genomics.- Computational Proteomics.- Gene Regulation Modeling and Analysis.- Protein-Protein Interaction Prediction.- Next-Gen Sequencing and Metagenomics.- Structure Prediction and Folding.- Evolutionary Optimization for Scheduling.- High-Throughput Biomedical Data Integration and Mining.- Machine Learning Algorithms and Applications.- Heuristic Optimization Algorithms for Real-World Applications.- Evolutionary Multi-Objective Optimization and Its Applications.- Swarm Evolutionary Algorithms for Scheduling and Combinatorial.- Optimization.- Swarm Intelligence and Applications in Combinatorial Optimization.- Advances in Metaheuristic Optimization Algorithm.- Advances in Image Processing and Pattern Recognition Techniques.- AI in Biomedicine.- Bioinformatics.- Biometrics Recognition.- Information Security.- Virtual Reality and Human-Computer Interaction.- Healthcare Informatics Theory and Methods.- Intelligent Computing in Computer Vision.- Intelligent Agent and Web Applications.- Reinforcement Learning.- Machine Learning.- Modeling, Simulation, and Optimization of Biological Systems.- Biomedical Data Modeling and Mining.- Cheminformatics.- Intelligent Computing in Computational Biology.- Protein Structure and Function Prediction.- Biomarker Discovery.- Hybrid Computational Intelligence: Theory and Application in Bioinformatics, Computational Biology and Systems Biology.- IoT and Smart Data.- Intelligent Systems and Applications for Bioengineering.- Evolutionary Optimization: Foundations and Its Applications to Intelligent Data Analytics.- Protein and Gene Bioinformatics: Analysis, Algorithms and Applications.
This book constitutes the proceedings of the 7th International Conference on Biomimetic and Biohybrid Systems, Living Machines 2018, held in Paris, France, in July 2018.The 40 full and 18 short papers presented in this volume were carefully reviewed and selected from 60 submissions. The theme of the conference targeted at the intersection of research on novel life-like technologies inspired by the scientific investigation of biological systems, biomimetics, and research that seeks to interface biological and artificial systems to create biohybrid systems.
This book sheds new light on Transform methods, which dominate the study of linear time-invariant systems in all areas of science and engineering, such as circuit theory, signal/image processing, communications, controls, vibration analysis, remote sensing, biomedical systems, optics and acoustics. It presents Fourier analysis primarily using physical explanations with waveforms and/or examples, only using mathematical formulations to the extent necessary for its practical use. Intended as a textbook for senior undergraduates and graduate level Fourier analysis courses in engineering and science departments, and as a supplementary textbook for a variety of application courses in science and engineering, the book is also a valuable reference for anyone - student or professional - specializing in practical applications of Fourier analysis. The prerequisite for reading this book is a sound understanding of calculus, linear algebra, signals and systems, and programming at the undergraduate level.
This book constitutes the proceedings of the 24th International Conference on Computing and Combinatorics, COCOON 2018, held in Qing Dao, China, in July 2018. The 62 papers presented in this volume were carefully reviewed and selected from 120 submissions. They deal with the areas of algorithms, theory of computation, computational complexity, and combinatorics related to computing.
This volume is focused on the emerging concept of Collaborative Innovation Networks (COINs). COINs are at the core of collaborative knowledge networks, distributed communities taking advantage of the wide connectivity and the support of communication technologies, spanning beyond the organizational perimeter of companies on a global scale. It includes the refereed conference papers from the 6th International Conference on COINs, June 8-11, 2016, in Rome, Italy. It includes papers for both application areas of COINs, (1) optimizing organizational creativity and performance, and (2) discovering and predicting new trends by identifying COINs on the Web through online social media analysis. Papers at COINs16 combine a wide range of interdisciplinary fields such as social network analysis, group dynamics, design and visualization, information systems and the psychology and sociality of collaboration, and intercultural analysis through the lens of online social media. They will cover most recent advances in areas from leadership and collaboration, trend prediction and data mining, to social competence and Internet communication.
This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.The 30 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on signatures and watermarking; composability; encryption; multiparty computation; anonymity and zero knowledge; secret sharing and oblivious transfer; lattices and post quantum cryptography; obfuscation; two-party computation; and protocols.
This book presents a coherent, novel vision of Smart Cities, built around a value-driven architecture. It describes the limitations of the contemporary notion of the Smart City and argues that the next developmental step must actively include not only the physical infrastructure, but information technology and human infrastructure as well, requiring the intensive integration of technical solutions from the Internet of Things (IoT) and social computing. The book is divided into five major parts, the first of which provides both a general introduction and a coherent vision that ties together all the components that are required to realize the vision for Smart Cities. Part II then discusses the provisioning and governance of Smart City systems and infrastructures. In turn, Part III addresses the core technologies and technological enablers for managing the social component of the Smart City platform. Both parts combine state-of-the-art research with cutting-edge industrial efforts in the respective fields. Lastly, Part IV details a road map to achieving Cyber-Human Smart Cities. Rounding out the coverage, it discusses the concrete technological advances needed to move beyond contemporary Smart Cities and toward the Smart Cities of the future. Overall, the book provides an essential overview of the latest developments in the areas of IoT and social computing research, and outlines a research roadmap for a closer integration of the two areas in the context of the Smart City. As such, it offers a valuable resource for researchers and graduate students alike.
This book offers researchers an understanding of the fundamental issues and a good starting point to work on this rapidly expanding field. It provides a comprehensive survey of current developments of heterogeneous information network. It also presents the newest research in applications of heterogeneous information networks to similarity search, ranking, clustering, recommendation. This information will help researchers to understand how to analyze networked data with heterogeneous information networks. Common data mining tasks are explored, including similarity search, ranking, and recommendation. The book illustrates some prototypes which analyze networked data. Professionals and academics working in data analytics, networks, machine learning, and data mining will find this content valuable. It is also suitable for advanced-level students in computer science who are interested in networking or pattern recognition.
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.
The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25-27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.
The two-volume set of LNCS 10941 and 10942 constitutes the proceedings of the 9th International Conference on Advances in Swarm Intelligence, ICSI 2018, held in Shanghai, China, in June 2018. The total of 113 papers presented in these volumes was carefully reviewed and selected from 197 submissions. The papers were organized in topical sections as follows: theories and models of swarm intelligence; ant colony optimization; particle swarm optimization; artificial bee colony algorithms; genetic algorithms; differential evolution; fireworks algorithms; bacterial foraging optimization; artificial immune system; hydrologic cycle optimization; other swarm-based optimization algorithms; hybrid optimization algorithms; multi-objective optimization; large-scale global optimization; multi-agent systems; swarm robotics; fuzzy logic approaches; planning and routing problems; recommendation in social media; prediction, classification; finding patterns; image enhancement; deep learning.
This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms. |
![]() ![]() You may like...
Information Technology in Disaster Risk…
Yuko Murayama, Dimiter Velev, …
Hardcover
R2,969
Discovery Miles 29 690
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Advances in Communication Systems and…
J. Jayakumari, George K. Karagiannidis, …
Hardcover
R5,907
Discovery Miles 59 070
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R4,130
Discovery Miles 41 300
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, …
Hardcover
R2,621
Discovery Miles 26 210
Handbook of Integration of Cloud…
Rajiv Ranjan, Karan Mitra, …
Hardcover
R6,164
Discovery Miles 61 640
|