0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm... International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II (Paperback, 1st ed. 2015)
Jin Tian, Jiwu Jing, Mudhakar Srivatsa
R2,839 Discovery Miles 28 390 Ships in 10 - 15 working days

This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.

International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm... International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I (Paperback, 1st ed. 2015)
Jing Tian, Jiwu Jing, Mudhakar Srivatsa
R3,533 Discovery Miles 35 330 Ships in 10 - 15 working days

This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.

Artificial Intelligence for Edge Computing (1st ed. 2023): Mudhakar Srivatsa, Tarek Abdelzaher, Ting He Artificial Intelligence for Edge Computing (1st ed. 2023)
Mudhakar Srivatsa, Tarek Abdelzaher, Ting He
R5,254 Discovery Miles 52 540 Ships in 10 - 15 working days

It is undeniable that the recent revival of artificial intelligence (AI) has significantly changed the landscape of science in many application domains, ranging from health to defense and from conversational interfaces to autonomous cars. With terms such as “Google Home”, “Alexa”, and “ChatGPT” becoming household names, the pervasive societal impact of AI is clear. Advances in AI promise a revolution in our interaction with the physical world, a domain where computational intelligence has always been envisioned as a transformative force toward a better tomorrow. Depending on the application family, this domain is often referred to as Ubiquitous Computing, Cyber-Physical Computing, or the Internet of Things. The underlying vision is driven by the proliferation of cheap embedded computing hardware that can be integrated easily into myriads of everyday devices from consumer electronics, such as personal wearables and smart household appliances, to city infrastructure and industrial process control systems. One common trait across these applications is that the data that the application operates on come directly (typically via sensors) from the physical world. Thus, from the perspective of communication network infrastructure, the data originate at the network edge. From a performance standpoint, there is an argument to be made that such data should be processed at the point of collection. Hence, a need arises for Edge AI -- a genre of AI where the inference, and sometimes even the training, are performed at the point of need, meaning at the edge where the data originate. The book is broken down into three parts: core problems, distributed problems, and other cross-cutting issues. It explores the challenges arising in Edge AI contexts. Some of these challenges (such as neural network model reduction to fit resource-constrained hardware) are unique to the edge environment. They need a novel category of solutions that do not parallel more typical concerns in mainstream AI. Others are adaptations of mainstream AI challenges to the edge space. An example is overcoming the cost of data labeling. The labeling problem is pervasive, but its solution in the IoT application context is different from other contexts. This book is not a survey of the state of the art. With thousands of publications appearing in AI every year, such a survey is doomed to be incomplete on arrival. It is also not a comprehensive coverage of all the problems in the space of Edge AI. Different applications pose different challenges, and a more comprehensive coverage should be more application specific. Instead, this book covers some of the more endemic challenges across the range of IoT/CPS applications. To offer coverage in some depth, we opt to cover mainly one or a few representative solutions for each of these endemic challenges in sufficient detail, rather that broadly touching on all relevant prior work. The underlying philosophy is one of illustrating by example. The solutions are curated to offer insight into a way of thinking that characterizes Edge AI research and distinguishes its solutions from their more mainstream counterparts.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Wonder Plant Food Stix - Premium Plant…
R49 R41 Discovery Miles 410
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
Maria's Keepers - One Woman's Escape…
Sam Human Paperback R280 R219 Discovery Miles 2 190
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
High Expectations
Mabel CD R59 Discovery Miles 590
Playseat Evolution Racing Chair (Black)
 (2)
R8,998 Discovery Miles 89 980
The Lion King - Blu-Ray + DVD
Blu-ray disc R344 Discovery Miles 3 440
Simba ABC Elephant Ring Rattle
 (3)
R66 Discovery Miles 660
Cable Guys Controller and Smartphone…
R359 Discovery Miles 3 590
Fine Living E-Table (Black | White)
 (7)
R319 R199 Discovery Miles 1 990

 

Partners