![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following workshops: Second International Workshop on Security in Self-Organising Networks (Self Net 2014); Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2014); Second International Workshop on Trust and Privacy in Cyberspace (Cyber Trust 2014).
Communications: Wireless in Developing Countries and Networks of the Future The present book contains the proceedings of two conferences held at the World Computer Congress 2010 in Brisbane, Australia (September 20-23) organized by the International Federation for Information Processing (IFIP): the Third IFIP TC 6 Int- national Conference on Wireless Communications and Information Technology for Developing Countries (WCITD 2010) and the IFIP TC 6 International Network of the Future Conference (NF 2010). The main objective of these two IFIP conferences on communications is to provide a platform for the exchange of recent and original c- tributions in wireless networks in developing countries and networks of the future. There are many exiting trends and developments in the communications industry, several of which are related to advances in wireless networks, and next-generation Internet. It is commonly believed in the communications industry that a new gene- tion should appear in the next ten years. Yet there are a number of issues that are being worked on in various industry research and development labs and universities towards enabling wireless high-speed networks, virtualization techniques, smart n- works, high-level security schemes, etc. We would like to thank the members of the Program Committees and the external reviewers and we hope these proceedings will be very useful to all researchers int- ested in the fields of wireless networks and future network technologies.
This brief examines current research on cooperative device-to-device (D2D) communication as an enhanced offloading technology to improve the performance of cognitive radio cellular networks. By providing an extensive review of recent advances in D2D communication, the authors demonstrate that the quality of D2D links significantly affects offloading performance in cellular networks, which motivates the design of cooperative D2D communication. After presenting the architecture of cooperative D2D communication, the challenges of capacity maximization and energy efficiency are addressed by optimizing relay assignment, power control and resource allocation. Furthermore, cooperative D2D communication is enhanced by network coding technology, and then is extended for broadcast sessions. Along with detailed problem formulation and hardness analysis, fast algorithms are developed by exploiting problem-specific characteristics such that they can be applied in practice.
This book comprises a selection of papers presented at a symposium organized under the aegis of COST Telecommunications Action 285. The main objective of the book is to enhance existing tools and develop new modeling and simulation tools for research in emerging multi-service telecommunication networks in the areas of model performance improvements, multilayer traffic modeling, and the important issue of evaluation and validation of the new modeling tools.
This book constitutes the thoroughly refereed, selected papers on the Second Cyber Security and Privacy EU Forum, CSP 2014, held in Athens, Greece, in May 2014. The 14 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on security; accountability, data protection and privacy; research and innovation.
This book advocates the idea of breaking up the cellular communication architecture by introducing cooperative strategies among wireless devices through cognitive wireless networking. It details the cooperative and cognitive aspects for future wireless communication networks. Coverage includes social and biological inspired behavior applied to wireless networks, peer-to-peer networking, cooperative networks, and spectrum sensing and management.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on Sensor Systems and Software, S-Cube 2013, held in Lucca, Italy, 2013. The 8 revised full papers and 2 invited papers presented cover contributions on different technologies for wireless sensor networks, including security protocols, middleware, analysis tools and frameworks.
This volume constitutes the refereed proceedings of the following 9 international workshops: OTM Academy, OTM Industry Case Studies Program, Cloud and Trusted Computing, C&TC, Enterprise Integration, Interoperability, and Networking, EI2N, Industrial and Business Applications of Semantic Web Technologies, INBAST, Information Systems, om Distributed Environment, ISDE, Methods, Evaluation, Tools and Applications for the Creation and Consumption of Structured Data for the e-Society, META4eS, Mobile and Social Computing for collaborative interactions, MSC, and Ontology Content, OnToContent 2014. These workshops were held as associated events at OTM 2014, the federated conferences "On The Move Towards Meaningful Internet Systems and Ubiquitous Computing", in Amantea, Italy, in October 2014. The 56 full papers presented together with 8 short papers, 6 posters and 5 keynotes were carefully reviewed and selected from a total of 96 submissions. The focus of the workshops were on the following subjects models for interoperable infrastructures, applications, privacy and access control, reliability and performance, cloud and configuration management, interoperability in (System-of-)Systems, distributed information systems applications, architecture and process in distributed information system, distributed information system development and operational environment, ontology is use for eSociety, knowledge management and applications for eSociety, social networks and social services, social and mobile intelligence, and multimodal interaction and collaboration.
Grids, P2P and Services Computing, the 12th volume of the CoreGRID series, is based on the CoreGrid ERCIM Working Group Workshop on Grids, P2P and Service Computing in Conjunction with EuroPar 2009. The workshop will take place August 24th, 2009 in Delft, The Netherlands. Grids, P2P and Services Computing, an edited volume contributed by well-established researchers worldwide, will focus on solving research challenges for Grid and P2P technologies. Topics of interest include: Service Level Agreement, Data & Knowledge Management, Scheduling, Trust and Security, Network Monitoring and more. Grids are a crucial enabling technology for scientific and industrial development. This book also includes new challenges related to service-oriented infrastructures. Grids, P2P and Services Computing is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Nature of Computation and Communication, ICTCC 2014, held in November 2014 in Ho Chi Minh City, Vietnam. The 34 revised full papers presented were carefully reviewed and selected from over 100 submissions. The papers cover formal methods for self-adaptive systems and discuss natural approaches and techniques for computation and communication.
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measurements ontologies; and access control.
Soft computing, as opposed to conventional "hard" computing, tolerates imprecision and uncertainty, in a way very much similar to the human mind. Soft computing techniques include neural networks, evolutionary computation, fuzzy logic, and chaos. The recent years have witnessed tremendous success of these powerful methods in virtually all areas of science and technology, as evidenced by the large numbers of research results published in a variety of journals, conferences, as weil as many excellent books in this book series on Studies in Fuzziness and Soft Computing. This volume is dedicated to recent novel applications of soft computing in communications. The book is organized in four Parts, i.e., (1) neural networks, (2) evolutionary computation, (3) fuzzy logic and neurofuzzy systems, and (4) kernel methods. Artificial neural networks consist of simple processing elements called neurons, which are connected by weights that may be adjusted during learning. Part 1 of the book has seven chapters, demonstrating some of the capabilities of two major types of neural networks, i.e., multiplayer perceptron (MLP) neural networks and Hopfield-type neural networks.
Semantic Web Services for Web Databases introduces an end-to-end framework for querying Web databases using novel Web service querying techniques. This includes a detailed framework for the query infrastructure for Web databases and services. Case studies are covered in the last section of this book. Semantic Web Services For Web Databases is designed for practitioners and researchers focused on service-oriented computing and Web databases.
One of the first books in the timely and important area of heavy traffic analysis of controlled and uncontrolled stochastics networks, by one of the leading authors in the field. The general theory is developed, with possibly state dependent parameters, and specialized to many different cases of practical interest.
This book constitutes the thoroughly refereed post conference proceedings of the 5th International Conference on Cloud Computing, CloudComp 2014, held in Guilin, China, in October 2014. The 25 revised full papers were carefully reviewed and selected from 72 submissions and cover topics such as mobile cloud computing, services, applications, IoT on cloud, architectures and big data, cloud-assisted pervasive computing and services, management and virtualization for cloud, cloud security.
This book constitutes the refereed proceedings of the 6th bi-annual Latin American Conference on Human-Computer Interaction, CLIHC 2013, held in Guanacasta, Costa Rica, in December 2013. The 11 full papers and 14 short papers were carefully reviewed and selected from 32 submissions. The papers address all current topics in HCI such as: cultural issues, assistive technologies, usability, accessibility, multimodal inter-faces, design issues, HCI education, and visualization and evaluation techniques, among others.
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.
This book constitutes the thoroughly refereed post conference proceedings of the Third International Conference on Cloud Computing, Cloud Comp 2012, held in Vienna, Austria, in September 2012. The 14 revised full papers were carefully reviewed and selected from numerous submissions and cover various topics in the application of cloud computing technologies.
This book constitutes the refereed proceedings of the 9th International Haifa Verification Conference, HVC 2013, held in Haifa, Israel in November 2013. The 24 revised full papers presented were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on SAT and SMT-based verification, software testing, supporting dynamic verification, specification and coverage, abstraction and model presentation.
This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Networking, ICDCN 2014, held in Coimbatore, India, in January 2014. The 32 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical sections named: mutual exclusion, agreement and consensus; parallel and multi-core computing; distributed algorithms; transactional memory; P2P and distributed networks; resource sharing and scheduling; cellular and cognitive radio networks and backbone networks.
This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2013, held in Pozna, Poland, in October 2013. The 63 revised full papers were carefully selected from 111 submissions. The topics covered are aquisition, pre-processing and coding, biometry, classification and recognition, depth, 3D and tracking, efficient implementation and frameworks, low level image analysis, segmentation and video analysis."
Queueing is an aspect of modern life that we encounter at every step in our daily activities. Whether it happens at the checkout counter in the supermarket or in accessing the Internet, the basic phenomenon of queueing arises whenever a shared facility needs to be accessed for service by a ]arge number of jobs or customers. The study of queueing is important as it gravides both a theoretical background to the kind of service that we may expect from such a facility and the way in which the facility itself may be designed to provide some specified grade of service to its customers. Our study of queueing was basically motivated by its use in the study of communication systems and computer networks. The various computers, routers and switches in such a network may be modelled as individual queues. The whole system may itself be modelled as a queueing network providing the required service to the messages, packets or cells that need to be carried. Application of queueing theory provides the theoretical framework for the design and study of such networks. The purpose of this book is to support a course on queueing systems at the senior undergraduate or graduate Ievels. Such a course would then provide the theoretical background on which a subsequent course on the performance modeHing and analysis of computer networks may be based.
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Wireless Internet, WICON 2013, held in Shanghai, China, in April 2012. The 20 revised full papers were carefully reviewed and selected from numerous submissions. The papers cover topics such as vehicular communications and heterogeneous networks, cognitive radio and multi-antenna systems, networks and beyond, ad hoc and mesh networks. |
You may like...
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan
Hardcover
R6,633
Discovery Miles 66 330
Handbook of Computer Networks and Cyber…
Brij B. Gupta, Gregorio Martinez Perez, …
Hardcover
R7,167
Discovery Miles 71 670
Design and Implementation of Practical…
Akshay Kumar, Ahmed Abdelhadi, …
Hardcover
R2,663
Discovery Miles 26 630
Learning from Imbalanced Data Sets
Alberto Fernandez, Salvador Garcia, …
Hardcover
R4,006
Discovery Miles 40 060
Fault Tolerant Architectures for…
Sikhar Patranabis, Debdeep Mukhopadhyay
Hardcover
R3,802
Discovery Miles 38 020
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Vehicular ad hoc Networks - Standards…
Claudia Campolo, Antonella Molinaro, …
Hardcover
R4,834
Discovery Miles 48 340
Malicious Attack Propagation and Source…
Jiaojiao Jiang, Sheng Wen, …
Hardcover
R3,336
Discovery Miles 33 360
|