0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (6)
  • R2,500 - R5,000 (14)
  • R5,000 - R10,000 (4)
  • -
Status
Brand

Showing 1 - 24 of 24 matches in All Departments

Introduction to Certificateless Cryptography (Paperback): Hu Xiong, Zhen Qin, Athanasios V Vasilakos Introduction to Certificateless Cryptography (Paperback)
Hu Xiong, Zhen Qin, Athanasios V Vasilakos
R1,457 Discovery Miles 14 570 Ships in 12 - 17 working days

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.

Vehicular Social Networks (Paperback): Anna Maria Vegni, Athanasios V Vasilakos, Valeria Loscri Vehicular Social Networks (Paperback)
Anna Maria Vegni, Athanasios V Vasilakos, Valeria Loscri
R1,435 Discovery Miles 14 350 Ships in 12 - 17 working days

The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.

Device-to-Device based Proximity Service - Architecture, Issues, and Applications (Paperback): Yufeng Wang, Athanasios V... Device-to-Device based Proximity Service - Architecture, Issues, and Applications (Paperback)
Yufeng Wang, Athanasios V Vasilakos, Qun Jin, Hongbo Zhu
R1,480 Discovery Miles 14 800 Ships in 12 - 17 working days

D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest applications and research results in academic, industrial fields, and standardization. The authors present the architecture, fundamental issues, and applications in a D2D networking environment from both application and interdisciplinary points of view.

Delay Tolerant Networks - Protocols and Applications (Hardcover): Yan Zhang, Athanasios V Vasilakos, Thrasyvoulos Spyropoulos Delay Tolerant Networks - Protocols and Applications (Hardcover)
Yan Zhang, Athanasios V Vasilakos, Thrasyvoulos Spyropoulos
R4,014 Discovery Miles 40 140 Ships in 12 - 17 working days

A class of Delay Tolerant Networks (DTN), which may violate one or more of the assumptions regarding the overall performance characteristics of the underlying links in order to achieve smooth operation, is rapidly growing in importance but may not be well served by the current end-to-end TCP/IP model. Delay Tolerant Networks: Protocols and Applications takes you on a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications.

Containing a wealth of illustrative material for ease of understanding, this one-stop reference discusses the various challenges associated with DTN. Written for a broad audience of researchers and practitioners, it supplies useful reference material for graduate students and senior undergraduate students in courses of networking, wireless, and mobile communications. Starting with an accessible introduction to DTNs, their architecture, bundle protocols, and routing schemes, the book provides authoritative coverage of:

  • DTN Routing
  • Energy-Aware Routing Protocol for DTNs
  • A Routing-Compatible Credit-Based Incentive Scheme
  • R-P2P: a Data-Centric Middleware for Delay Tolerant Applications
  • Mobile Peer-to-Peer Systems over DTNs
  • Delay-Tolerant Monitoring of Mobility-Assisted WSN
  • Message Dissemination in Vehicular Networks
  • DTN Protocols for Space Communications
  • DTN for Satellite Communications

Reporting on the latest developments in these domains, the distinguished panel of contributors supplies a realistic look into the future of networking. Complete with sections that summarize open issues in each domain, this book arms you with the understanding and methods required to make an impact on the advancement of these emerging networks that continue to grow in importance.

Fundamentals of Quantum Programming in IBM's Quantum Computers (Hardcover, 1st ed. 2021): Weng-Long Chang, Athanasios V... Fundamentals of Quantum Programming in IBM's Quantum Computers (Hardcover, 1st ed. 2021)
Weng-Long Chang, Athanasios V Vasilakos
R3,009 Discovery Miles 30 090 Ships in 10 - 15 working days

This textbook introduces major topics that include quantum bits, superposition, entanglement, logic gates, quantum search algorithm, quantum Fourier transform, inverse quantum Fourier transform, Shor's order-finding algorithm and phase estimation. Everyone can write algorithms and programs in the cloud making using IBM's quantum computers that support IBM Q Experience which contains the composer, open quantum assembly language, simulators and real quantum devices. Furthermore, this book teaches you how to use open quantum assembly language to write quantum programs for dealing with complex problems. Through numerous examples and exercises, readers will learn how to write a quantum program with open quantum assembly language for solving any problem from start to complete. This book includes six main chapters: *Quantum Bits and Quantum Gates-learn what quantum bits are, how to declare and measure them, what quantum gates are and how they work on a simulator or a real device in the cloud. *Boolean Algebra and its Applications-learn how to decompose CCNOT gate into six CNOT gates and nine gates of one bit and how to use NOT gates, CNOT gates and CCNOT gates to implement logic operations including NOT, OR, AND, NOR, NAND, Exclusive-OR (XOR) and Exclusive-NOR (XNOR). *Quantum Search Algorithm and its Applications-learn core concepts of quantum search algorithm and how to write quantum programs to implement core concepts of quantum search algorithm for solving two famous NP-complete problems that are the satisfiability problem in n Boolean variables and m clauses and the clique problem in a graph with n vertices and q edges. *Quantum Fourier Transform and its Applications-learn core concepts of quantum Fourier transform and inverse quantum Fourier transform and how to write quantum programs to implement them for solving two real applications that are to compute the period and the frequency of two given oracular functions. *Order-Finding and Factoring-learn core concepts of Shor's order-finding algorithm and how to write quantum programs to implement Shor's order-finding algorithm for completing the prime factorization to 15. Phase Estimation and its Applications-learn core concepts of phase estimation and quantum counting and how to write quantum programs to implement them to compute the number of solution(s) in the independent set problem in a graph with two vertices and one edge.

Computational Intelligence for Semantic Knowledge Management - New Perspectives for Designing and Organizing Information... Computational Intelligence for Semantic Knowledge Management - New Perspectives for Designing and Organizing Information Systems (Hardcover, 1st ed. 2020)
Giovanni Acampora, Witold Pedrycz, Athanasios V Vasilakos, Autilia Vitiello
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

This book provides a comprehensive overview of computational intelligence methods for semantic knowledge management. Contrary to popular belief, the methods for semantic management of information were created several decades ago, long before the birth of the Internet. In fact, it was back in 1945 when Vannevar Bush introduced the idea for the first protohypertext: the MEMEX (MEMory + indEX) machine. In the years that followed, Bush's idea influenced the development of early hypertext systems until, in the 1980s, Tim Berners Lee developed the idea of the World Wide Web (WWW) as it is known today. From then on, there was an exponential growth in research and industrial activities related to the semantic management of the information and its exploitation in different application domains, such as healthcare, e-learning and energy management. However, semantics methods are not yet able to address some of the problems that naturally characterize knowledge management, such as the vagueness and uncertainty of information. This book reveals how computational intelligence methodologies, due to their natural inclination to deal with imprecision and partial truth, are opening new positive scenarios for designing innovative semantic knowledge management architectures.

Foundations of Computational Intelligence - Volume 1: Learning and Approximation (Paperback, Softcover reprint of the original... Foundations of Computational Intelligence - Volume 1: Learning and Approximation (Paperback, Softcover reprint of the original 1st ed. 2009)
Aboul Ella Hassanien, Ajith Abraham, Athanasios V Vasilakos, Witold Pedrycz
R2,994 Discovery Miles 29 940 Ships in 10 - 15 working days

Foundations of Computational Intelligence Volume 1: Learning and Approximation: Theoretical Foundations and Applications Learning methods and approximation algorithms are fundamental tools that deal with computationally hard problems and problems in which the input is gradually disclosed over time. Both kinds of problems have a large number of applications arising from a variety of fields, such as algorithmic game theory, approximation classes, coloring and partitioning, competitive analysis, computational finance, cuts and connectivity, inapproximability results, mechanism design, network design, packing and covering, paradigms for design and analysis of approxi- tion and online algorithms, randomization techniques, real-world applications, scheduling problems and so on. The past years have witnessed a large number of interesting applications using various techniques of Computational Intelligence such as rough sets, connectionist learning; fuzzy logic; evolutionary computing; artificial immune systems; swarm intelligence; reinforcement learning, intelligent multimedia processing etc. . In spite of numerous successful applications of C- putational Intelligence in business and industry, it is sometimes difficult to explain the performance of these techniques and algorithms from a theoretical perspective. Therefore, we encouraged authors to present original ideas dealing with the inc- poration of different mechanisms of Computational Intelligent dealing with Lea- ing and Approximation algorithms and underlying processes. This edited volume comprises 15 chapters, including an overview chapter, which provides an up-to-date and state-of-the art research on the application of Computational Intelligence for learning and approximation.

Energy Management in Wireless Cellular and Ad-hoc Networks (Paperback, Softcover reprint of the original 1st ed. 2016):... Energy Management in Wireless Cellular and Ad-hoc Networks (Paperback, Softcover reprint of the original 1st ed. 2016)
Muhammad Zeeshan Shakir, Muhammad Ali Imran, Khalid A. Qaraqe, Mohamed-Slim Alouini, Athanasios V Vasilakos
R3,009 Discovery Miles 30 090 Ships in 10 - 15 working days

This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services.

Molecular Computing - Towards a Novel Computing Architecture for Complex Problem Solving (Paperback, Softcover reprint of the... Molecular Computing - Towards a Novel Computing Architecture for Complex Problem Solving (Paperback, Softcover reprint of the original 1st ed. 2014)
Weng-Long Chang, Athanasios V Vasilakos
R3,793 Discovery Miles 37 930 Ships in 10 - 15 working days

This textbook introduces a concise approach to the design of molecular algorithms for students or researchers who are interested in dealing with complex problems. Through numerous examples and exercises, you will understand the main difference of molecular circuits and traditional digital circuits to manipulate the same problem and you will also learn how to design a molecular algorithm of solving any a problem from start to finish. The book starts with an introduction to computational aspects of digital computers and molecular computing, data representation of molecular computing, molecular operations of molecular computing and number representation of molecular computing and provides many molecular algorithm to construct the parity generator and the parity checker of error-detection codes on digital communication, to encode integers of different formats, single precision and double precision of floating-point numbers, to implement addition and subtraction of unsigned integers, to construct logic operations including NOT, OR, AND, NOR, NAND, Exclusive-OR (XOR) and Exclusive-NOR (XNOR), to implement comparators, shifters, increase, decrease, and to complete two specific operations that are to find the maximum number of “1” and to find the minimum number of “1”. The book is also a useful reference source to people new for the field of molecular computing.

Energy Management in Wireless Cellular and Ad-hoc Networks (Hardcover, 1st ed. 2016): Muhammad Zeeshan Shakir, Muhammad Ali... Energy Management in Wireless Cellular and Ad-hoc Networks (Hardcover, 1st ed. 2016)
Muhammad Zeeshan Shakir, Muhammad Ali Imran, Khalid A. Qaraqe, Mohamed-Slim Alouini, Athanasios V Vasilakos
R3,084 Discovery Miles 30 840 Ships in 10 - 15 working days

This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services.

Routing in Opportunistic Networks (Paperback, 2013 ed.): Isaac Woungang, Sanjay Kumar Dhurandher, Alagan Anpalagan, Athanasios... Routing in Opportunistic Networks (Paperback, 2013 ed.)
Isaac Woungang, Sanjay Kumar Dhurandher, Alagan Anpalagan, Athanasios V Vasilakos
R5,767 Discovery Miles 57 670 Ships in 10 - 15 working days

Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.

Autonomic Communication (Paperback, 2009 ed.): Athanasios V Vasilakos, Manish Parashar, Stamatis Karnouskos, Witold Pedrycz Autonomic Communication (Paperback, 2009 ed.)
Athanasios V Vasilakos, Manish Parashar, Stamatis Karnouskos, Witold Pedrycz
R4,516 Discovery Miles 45 160 Ships in 10 - 15 working days

New paradigms for communication/networking systems are needed in order to tackle the emerging issues such as heterogeneity, complexity and management of evolvable infrastructures. In order to realize such advanced systems, approaches should become task- and knowledge-driven, enabling a service-oriented, requirement, and trust-driven development of communication networks. The networking and seamless integration of concepts, technologies and devices in a dynamically changing environment poses many challenges to the research community, including interoperability, programmability, management, openness, reliability, performance, context awareness, intelligence, autonomy, security, privacy, safety, and semantics. This edited volume explores the challenges of technologies to realize the vision where devices and applications seamlessly interconnect, intelligently cooperate, and autonomously manage themselves, and as a result, the borders of virtual and real world vanish or become significantly blurred.

Molecular Computing - Towards a Novel Computing Architecture for Complex Problem Solving (Hardcover, 2014): Weng-Long Chang,... Molecular Computing - Towards a Novel Computing Architecture for Complex Problem Solving (Hardcover, 2014)
Weng-Long Chang, Athanasios V Vasilakos
R4,041 Discovery Miles 40 410 Ships in 10 - 15 working days

This textbook introduces a concise approach to the design of molecular algorithms for students or researchers who are interested in dealing with complex problems. Through numerous examples and exercises, you will understand the main difference of molecular circuits and traditional digital circuits to manipulate the same problem and you will also learn how to design a molecular algorithm of solving any a problem from start to finish. The book starts with an introduction to computational aspects of digital computers and molecular computing, data representation of molecular computing, molecular operations of molecular computing and number representation of molecular computing and provides many molecular algorithm to construct the parity generator and the parity checker of error-detection codes on digital communication, to encode integers of different formats, single precision and double precision of floating-point numbers, to implement addition and subtraction of unsigned integers, to construct logic operations including NOT, OR, AND, NOR, NAND, Exclusive-OR (XOR) and Exclusive-NOR (XNOR), to implement comparators, shifters, increase, decrease, and to complete two specific operations that are to find the maximum number of "1" and to find the minimum number of "1." The book is also a useful reference source to people new for the field of molecular computing.

Routing in Opportunistic Networks (Hardcover, 2013 ed.): Isaac Woungang, Sanjay Kumar Dhurandher, Alagan Anpalagan, Athanasios... Routing in Opportunistic Networks (Hardcover, 2013 ed.)
Isaac Woungang, Sanjay Kumar Dhurandher, Alagan Anpalagan, Athanasios V Vasilakos
R6,019 Discovery Miles 60 190 Ships in 10 - 15 working days

Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.

Foundations of Computational Intelligence - Volume 1: Learning and Approximation (Paperback, Softcover reprint of hardcover 1st... Foundations of Computational Intelligence - Volume 1: Learning and Approximation (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Aboul Ella Hassanien, Ajith Abraham, Athanasios V Vasilakos, Witold Pedrycz
R4,750 Discovery Miles 47 500 Ships in 10 - 15 working days

Recent years have seen numerous applications across a variety of fields using various techniques of Computational Intelligence. This book, one of a series on the foundations of Computational Intelligence, is focused on learning and approximation.

Delay Tolerant Networks - Protocols and Applications (Paperback): Yan Zhang, Athanasios V Vasilakos, Thrasyvoulos Spyropoulos Delay Tolerant Networks - Protocols and Applications (Paperback)
Yan Zhang, Athanasios V Vasilakos, Thrasyvoulos Spyropoulos
R1,908 Discovery Miles 19 080 Ships in 12 - 17 working days

A class of Delay Tolerant Networks (DTN), which may violate one or more of the assumptions regarding the overall performance characteristics of the underlying links in order to achieve smooth operation, is rapidly growing in importance but may not be well served by the current end-to-end TCP/IP model. Delay Tolerant Networks: Protocols and Applications takes you on a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. Containing a wealth of illustrative material for ease of understanding, this one-stop reference discusses the various challenges associated with DTN. Written for a broad audience of researchers and practitioners, it supplies useful reference material for graduate students and senior undergraduate students in courses of networking, wireless, and mobile communications. Starting with an accessible introduction to DTNs, their architecture, bundle protocols, and routing schemes, the book provides authoritative coverage of: DTN Routing Energy-Aware Routing Protocol for DTNs A Routing-Compatible Credit-Based Incentive Scheme R-P2P: a Data-Centric Middleware for Delay Tolerant Applications Mobile Peer-to-Peer Systems over DTNs Delay-Tolerant Monitoring of Mobility-Assisted WSN Message Dissemination in Vehicular Networks DTN Protocols for Space Communications DTN for Satellite Communications Reporting on the latest developments in these domains, the distinguished panel of contributors supplies a realistic look into the future of networking. Complete with sections that summarize open issues in each domain, this book arms you with the understanding and methods required to make an impact on the advancement of these emerging networks that continue to grow in importance.

Device-to-Device based Proximity Service - Architecture, Issues, and Applications (Hardcover): Yufeng Wang, Athanasios V... Device-to-Device based Proximity Service - Architecture, Issues, and Applications (Hardcover)
Yufeng Wang, Athanasios V Vasilakos, Qun Jin, Hongbo Zhu
R5,812 Discovery Miles 58 120 Ships in 12 - 17 working days

D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest applications and research results in academic, industrial fields, and standardization. The authors present the architecture, fundamental issues, and applications in a D2D networking environment from both application and interdisciplinary points of view.

Fundamentals of Quantum Programming in IBM's Quantum Computers (Paperback, 1st ed. 2021): Weng-Long Chang, Athanasios V... Fundamentals of Quantum Programming in IBM's Quantum Computers (Paperback, 1st ed. 2021)
Weng-Long Chang, Athanasios V Vasilakos
R1,958 Discovery Miles 19 580 Ships in 10 - 15 working days

This textbook introduces major topics that include quantum bits, superposition, entanglement, logic gates, quantum search algorithm, quantum Fourier transform, inverse quantum Fourier transform, Shor's order-finding algorithm and phase estimation. Everyone can write algorithms and programs in the cloud making using IBM's quantum computers that support IBM Q Experience which contains the composer, open quantum assembly language, simulators and real quantum devices. Furthermore, this book teaches you how to use open quantum assembly language to write quantum programs for dealing with complex problems. Through numerous examples and exercises, readers will learn how to write a quantum program with open quantum assembly language for solving any problem from start to complete. This book includes six main chapters: *Quantum Bits and Quantum Gates-learn what quantum bits are, how to declare and measure them, what quantum gates are and how they work on a simulator or a real device in the cloud. *Boolean Algebra and its Applications-learn how to decompose CCNOT gate into six CNOT gates and nine gates of one bit and how to use NOT gates, CNOT gates and CCNOT gates to implement logic operations including NOT, OR, AND, NOR, NAND, Exclusive-OR (XOR) and Exclusive-NOR (XNOR). *Quantum Search Algorithm and its Applications-learn core concepts of quantum search algorithm and how to write quantum programs to implement core concepts of quantum search algorithm for solving two famous NP-complete problems that are the satisfiability problem in n Boolean variables and m clauses and the clique problem in a graph with n vertices and q edges. *Quantum Fourier Transform and its Applications-learn core concepts of quantum Fourier transform and inverse quantum Fourier transform and how to write quantum programs to implement them for solving two real applications that are to compute the period and the frequency of two given oracular functions. *Order-Finding and Factoring-learn core concepts of Shor's order-finding algorithm and how to write quantum programs to implement Shor's order-finding algorithm for completing the prime factorization to 15. Phase Estimation and its Applications-learn core concepts of phase estimation and quantum counting and how to write quantum programs to implement them to compute the number of solution(s) in the independent set problem in a graph with two vertices and one edge.

Security and Fault Tolerance in Internet of Things (Hardcover, 1st ed. 2019): Rajat Subhra Chakraborty, Jimson Mathew,... Security and Fault Tolerance in Internet of Things (Hardcover, 1st ed. 2019)
Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V Vasilakos
R3,479 Discovery Miles 34 790 Ships in 10 - 15 working days

This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused.

Autonomic Computing and Communications Systems - Third International ICST Conference, Autonomics 2009, Limassol, Cyprus,... Autonomic Computing and Communications Systems - Third International ICST Conference, Autonomics 2009, Limassol, Cyprus, September 9-11, 2009, Revised Selected Papers (Paperback, Edition.)
Athanasios V Vasilakos, Roberto Beraldi, Roy Friedman, Marco Mamei
R1,553 Discovery Miles 15 530 Ships in 10 - 15 working days

These proceedings contain the papers presented at the Third International ICST C- ference on Autonomic Computing and Communication Systems, Autonomics 2009, held at the Cyprus University of Technology, Limassol, Cyprus, during September 9-11, 2009. As for the previous editions of the conference, this year too the primary goal of the event was to allow people working in the areas of communication, design, progr- ming, use and fundamental limits of autonomics pervasive systems to meet and - change their ideas and experiences in the aforementioned issues. In maintaining the tradition of excellence of Autonomics, this year we accepted 11 high-quality papers out of 26 submitted and had 5 invited talks, covering various aspects of autonomic computing including applications, middleware, networking protocols, and evaluation. The wide interest in the autonomic systems is shown by the broad range of topics covered in the papers presented at the conference. All papers presented at the conf- ence are published here and some of them, which are considered particularly intere- ing, will be considered for publication in a special issue of the International Journal of Autonomics and Adaptive Communications Systems (IJAACS). The conference also hosted the First International Workshop on Agent-Based Social Simulation and Au- nomic Systems (ABSS@AS).

Foundations of Computational Intelligence - Volume 1: Learning and Approximation (Hardcover, 2009 ed.): Aboul Ella Hassanien,... Foundations of Computational Intelligence - Volume 1: Learning and Approximation (Hardcover, 2009 ed.)
Aboul Ella Hassanien, Ajith Abraham, Athanasios V Vasilakos, Witold Pedrycz
R3,213 Discovery Miles 32 130 Ships in 10 - 15 working days

Foundations of Computational Intelligence Volume 1: Learning and Approximation: Theoretical Foundations and Applications Learning methods and approximation algorithms are fundamental tools that deal with computationally hard problems and problems in which the input is gradually disclosed over time. Both kinds of problems have a large number of applications arising from a variety of fields, such as algorithmic game theory, approximation classes, coloring and partitioning, competitive analysis, computational finance, cuts and connectivity, inapproximability results, mechanism design, network design, packing and covering, paradigms for design and analysis of approxi- tion and online algorithms, randomization techniques, real-world applications, scheduling problems and so on. The past years have witnessed a large number of interesting applications using various techniques of Computational Intelligence such as rough sets, connectionist learning; fuzzy logic; evolutionary computing; artificial immune systems; swarm intelligence; reinforcement learning, intelligent multimedia processing etc. . In spite of numerous successful applications of C- putational Intelligence in business and industry, it is sometimes difficult to explain the performance of these techniques and algorithms from a theoretical perspective. Therefore, we encouraged authors to present original ideas dealing with the inc- poration of different mechanisms of Computational Intelligent dealing with Lea- ing and Approximation algorithms and underlying processes. This edited volume comprises 15 chapters, including an overview chapter, which provides an up-to-date and state-of-the art research on the application of Computational Intelligence for learning and approximation.

Autonomic Communication (Hardcover, 2010 ed.): Athanasios V Vasilakos, Manish Parashar, Stamatis Karnouskos, Witold Pedrycz Autonomic Communication (Hardcover, 2010 ed.)
Athanasios V Vasilakos, Manish Parashar, Stamatis Karnouskos, Witold Pedrycz
R4,728 Discovery Miles 47 280 Ships in 10 - 15 working days

New paradigms for communication/networking systems are needed in order to tackle the emerging issues such as heterogeneity, complexity and management of evolvable infrastructures. In order to realize such advanced systems, approaches should become task- and knowledge-driven, enabling a service-oriented, requirement, and trust-driven development of communication networks. The networking and seamless integration of concepts, technologies and devices in a dynamically changing environment poses many challenges to the research community, including interoperability, programmability, management, openness, reliability, performance, context awareness, intelligence, autonomy, security, privacy, safety, and semantics. This edited volume explores the challenges of technologies to realize the vision where devices and applications seamlessly interconnect, intelligently cooperate, and autonomously manage themselves, and as a result, the borders of virtual and real world vanish or become significantly blurred.

Vehicular Social Networks (Hardcover): Anna Maria Vegni, Athanasios V Vasilakos, Valeria Loscri Vehicular Social Networks (Hardcover)
Anna Maria Vegni, Athanasios V Vasilakos, Valeria Loscri
R5,335 Discovery Miles 53 350 Ships in 12 - 17 working days

The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.

Introduction to Certificateless Cryptography (Hardcover): Hu Xiong, Zhen Qin, Athanasios V Vasilakos Introduction to Certificateless Cryptography (Hardcover)
Hu Xiong, Zhen Qin, Athanasios V Vasilakos
R2,652 Discovery Miles 26 520 Ships in 12 - 17 working days

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
LocknLock Pet Dry Food Container (1.6L)
R109 R91 Discovery Miles 910
Canary Crochet Hammock (White)
R999 R349 Discovery Miles 3 490
PostUCare™ 3-in-1 Ergonomic & Posture…
 (1)
R2,599 R2,099 Discovery Miles 20 990
Complete Vital+ Dog Food - Small to…
R208 R197 Discovery Miles 1 970
Lucky Lubricating Clipper Oil (100ml)
R69 R13 Discovery Miles 130
Sudocrem Skin & Baby Care Barrier Cream…
R128 Discovery Miles 1 280
Kendall Office Chair (Green)
R1,699 R899 Discovery Miles 8 990
Rotatrim A4 Paper Reams (80gsm)(Box of…
 (1)
R499 R450 Discovery Miles 4 500
The Tears Of Hercules
Rod Stewart CD R61 Discovery Miles 610
Poly Blackwire C3220 Corded On-Ear…
R1,082 Discovery Miles 10 820

 

Partners