0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (11)
  • R2,500 - R5,000 (9)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 22 of 22 matches in All Departments

Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback): Brij B. Gupta, Quan Z.... Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback)
Brij B. Gupta, Quan Z. Sheng
R1,600 Discovery Miles 16 000 Ships in 12 - 17 working days

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.

Enabling Context-Aware Web Services - Methods, Architectures, and Technologies (Paperback): Quan Z. Sheng, Jian Yu, Schahram... Enabling Context-Aware Web Services - Methods, Architectures, and Technologies (Paperback)
Quan Z. Sheng, Jian Yu, Schahram Dustdar
R2,071 Discovery Miles 20 710 Ships in 12 - 17 working days

With recent advances in radio-frequency identification (RFID) technology, sensor networks, and enhanced Web services, the original World Wide Web is continuing its evolution into what is being called the Web of Things and Services. Such a Web will support an ultimately interactive environment where everyday physical objects such as buildings, sidewalks, and commodities become recognizable, addressable, and even controllable via a mostly ubiquitous Web. This integration of the physical and virtual worlds will fundamentally impact the way we live and in doing so afford tremendous new business opportunities with great human benefit, such as support services to keep the elderly independent, and intelligent traffic management that will cut wasted hours from every day. More efficient supply chains, improved environmental monitoring, better access to health services ... the list is endless. Enabling Context-Aware Web Services: Methods, Architectures, and Technologies compiles the newest developments and advances driving this new age forward. With contributions from leading researchers across the world this pioneering work bridges the gap between context-awareness and Web services. A comprehensive presentation of what's already accomplished and what is possible, the chapters of this book are systematically organized into three major sections: Methods focuses on the principle of context awareness in Web services and various ways to model those services at the specification level. Architectures details the infrastructures, frameworks, and standards needed to build context-aware Web services. Technologies presents a cornucopia of techniques adapted from once isolated research areas including semantic Web, database, and artificial intelligence development, as well as formal methods being employed to improve the development of context-aware Web services. Researchers, engineers, entrepreneurs, and educators across any number of fields will find new ideas worth considering, jumping-off points for developing improved software and applications, and seeds for business ventures that efficiently deliver needed products, information, or services. The possibilities are as limitless as we dare to imagine.

Managing Data From Knowledge Bases: Querying and Extraction (Paperback, Softcover reprint of the original 1st ed. 2018): Wei... Managing Data From Knowledge Bases: Querying and Extraction (Paperback, Softcover reprint of the original 1st ed. 2018)
Wei Emma Zhang, Quan Z. Sheng
R3,212 Discovery Miles 32 120 Ships in 10 - 15 working days

In this book, the authors first address the research issues by providing a motivating scenario, followed by the exploration of the principles and techniques of the challenging topics. Then they solve the raised research issues by developing a series of methodologies. More specifically, the authors study the query optimization and tackle the query performance prediction for knowledge retrieval. They also handle unstructured data processing, data clustering for knowledge extraction. To optimize the queries issued through interfaces against knowledge bases, the authors propose a cache-based optimization layer between consumers and the querying interface to facilitate the querying and solve the latency issue. The cache depends on a novel learning method that considers the querying patterns from individual's historical queries without having knowledge of the backing systems of the knowledge base. To predict the query performance for appropriate query scheduling, the authors examine the queries' structural and syntactical features and apply multiple widely adopted prediction models. Their feature modelling approach eschews the knowledge requirement on both the querying languages and system. To extract knowledge from unstructured Web sources, the authors examine two kinds of Web sources containing unstructured data: the source code from Web repositories and the posts in programming question-answering communities. They use natural language processing techniques to pre-process the source codes and obtain the natural language elements. Then they apply traditional knowledge extraction techniques to extract knowledge. For the data from programming question-answering communities, the authors make the attempt towards building programming knowledge base by starting with paraphrase identification problems and develop novel features to accurately identify duplicate posts. For domain specific knowledge extraction, the authors propose to use a clustering technique to separate knowledge into different groups. They focus on developing a new clustering algorithm that uses manifold constraints in the optimization task and achieves fast and accurate performance. For each model and approach presented in this dissertation, the authors have conducted extensive experiments to evaluate it using either public dataset or synthetic data they generated.

Managing Data From Knowledge Bases: Querying and Extraction (Hardcover, 1st ed. 2018): Wei Emma Zhang, Quan Z. Sheng Managing Data From Knowledge Bases: Querying and Extraction (Hardcover, 1st ed. 2018)
Wei Emma Zhang, Quan Z. Sheng
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

In this book, the authors first address the research issues by providing a motivating scenario, followed by the exploration of the principles and techniques of the challenging topics. Then they solve the raised research issues by developing a series of methodologies. More specifically, the authors study the query optimization and tackle the query performance prediction for knowledge retrieval. They also handle unstructured data processing, data clustering for knowledge extraction. To optimize the queries issued through interfaces against knowledge bases, the authors propose a cache-based optimization layer between consumers and the querying interface to facilitate the querying and solve the latency issue. The cache depends on a novel learning method that considers the querying patterns from individual's historical queries without having knowledge of the backing systems of the knowledge base. To predict the query performance for appropriate query scheduling, the authors examine the queries' structural and syntactical features and apply multiple widely adopted prediction models. Their feature modelling approach eschews the knowledge requirement on both the querying languages and system. To extract knowledge from unstructured Web sources, the authors examine two kinds of Web sources containing unstructured data: the source code from Web repositories and the posts in programming question-answering communities. They use natural language processing techniques to pre-process the source codes and obtain the natural language elements. Then they apply traditional knowledge extraction techniques to extract knowledge. For the data from programming question-answering communities, the authors make the attempt towards building programming knowledge base by starting with paraphrase identification problems and develop novel features to accurately identify duplicate posts. For domain specific knowledge extraction, the authors propose to use a clustering technique to separate knowledge into different groups. They focus on developing a new clustering algorithm that uses manifold constraints in the optimization task and achieves fast and accurate performance. For each model and approach presented in this dissertation, the authors have conducted extensive experiments to evaluate it using either public dataset or synthetic data they generated.

Trust Management in Cloud Services (Paperback, Softcover reprint of the original 1st ed. 2014): Talal H. Noor, Quan Z. Sheng,... Trust Management in Cloud Services (Paperback, Softcover reprint of the original 1st ed. 2014)
Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
R1,934 Discovery Miles 19 340 Ships in 10 - 15 working days

This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services. The authors present the design and implementation of a novel protocol that preserves the consumers' privacy, an adaptive and robust credibility model, a scalable availability model that relies on a decentralized architecture, and a cloud service crawler engine for automatic cloud services discovery. This book also analyzes results from a performance study on a number of open research issues for trust management in cloud environments including distribution of providers, geographic location and languages. These open research issues illustrate both an overview of the current state of cloud computing and potential future directions for the field. Trust Management in Cloud Services contains both theoretical and applied computing research, making it an ideal reference or secondary text book to both academic and industry professionals interested in cloud services. Advanced-level students in computer science and electrical engineering will also find the content valuable.

Web Services Foundations (Paperback, Softcover reprint of the original 1st ed. 2014): Athman Bouguettaya, Quan Z. Sheng,... Web Services Foundations (Paperback, Softcover reprint of the original 1st ed. 2014)
Athman Bouguettaya, Quan Z. Sheng, Florian Daniel
R4,631 Discovery Miles 46 310 Ships in 10 - 15 working days

Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application logic encapsulated by Web services. Web services could be considered the best-known and most standardized technology in use today for distributed computing over the Internet. Web Services Foundations is the first installment of a two-book collection covering the state-of-the-art of both theoretical and practical aspects of Web services and SOC research. This book specifically focuses on the foundations of Web services and SOC and covers - among others - Web service composition, non-functional aspects of Web services, Web service selection and recommendation, and assisted Web service composition. The editors collect advanced topics in the second book of the collection, Advanced Web Services, (Springer, 2013). Both books together comprise approximately 1400 pages and are the result of an enormous community effort that involved more than 100 authors, comprising the world's leading experts in this field.

Trust Management in Cloud Services (Hardcover, 2014 ed.): Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya Trust Management in Cloud Services (Hardcover, 2014 ed.)
Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
R2,177 Discovery Miles 21 770 Ships in 10 - 15 working days

This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services. The authors present the design and implementation of a novel protocol that preserves the consumers' privacy, an adaptive and robust credibility model, a scalable availability model that relies on a decentralized architecture, and a cloud service crawler engine for automatic cloud services discovery. This book also analyzes results from a performance study on a number of open research issues for trust management in cloud environments including distribution of providers, geographic location and languages. These open research issues illustrate both an overview of the current state of cloud computing and potential future directions for the field. Trust Management in Cloud Services contains both theoretical and applied computing research, making it an ideal reference or secondary text book to both academic and industry professionals interested in cloud services. Advanced-level students in computer science and electrical engineering will also find the content valuable.

Unique Radio Innovation for the 21st Century - Building Scalable and Global RFID Networks (Paperback, 2011 ed.): Damith C.... Unique Radio Innovation for the 21st Century - Building Scalable and Global RFID Networks (Paperback, 2011 ed.)
Damith C. Ranasinghe, Quan Z. Sheng, Sherali Zeadally
R1,614 Discovery Miles 16 140 Ships in 10 - 15 working days

Are you an engineer or a researcher developing RFID systems? Are you a manager considering deploying RFID-based applications? If so, this book is for you. Covering modern RFID systems, the challenges to RFID implementation are addressed using specific industrial research examples and common integration issues. The primary focus is on answering questions surrounding building scalable global Internet-based RFID networks. Key topics include RFID data management, RFID data processing and integration, Real-Time Locating Systems (RTLS) and sensors. The book considers the challenges of and solutions to building and exploiting global networks to guarantee one of the most important business drivers for modern RFID technology: traceability. The authors have drawn together RFID applications from the retail supply chain, asset and product lifecycle management, anti-counterfeiting and cold chain management to explore how global traceability networks can be created using RFID and sensor technologies. They present insights from world's leading research laboratories.

Current Trends in Web Engineering - ICWE 2013 International Workshops ComposableWeb, QWE, MDWE, DMSSW, EMotions, CSE, SSN, and... Current Trends in Web Engineering - ICWE 2013 International Workshops ComposableWeb, QWE, MDWE, DMSSW, EMotions, CSE, SSN, and PhD Symposium, Aalborg, Denmark, July 8-12, 2013. Revised Selected Papers (Paperback, 2013 ed.)
Quan Z. Sheng, Jesper Kjeldskov
R2,678 Discovery Miles 26 780 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the seven workshops and the PhD Symposium that were co-located with the 13th International Conference on Web Engineering, ICWE 2013, held in Aalborg, Denmark, in July 2013. The papers cover research in topics such as social data management; cloud service engineering; agile web development and quality management in web engineering.

Web Services Foundations (Hardcover, 2014 ed.): Athman Bouguettaya, Quan Z. Sheng, Florian Daniel Web Services Foundations (Hardcover, 2014 ed.)
Athman Bouguettaya, Quan Z. Sheng, Florian Daniel
R4,655 Discovery Miles 46 550 Ships in 10 - 15 working days

Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application logic encapsulated by Web services. Web services could be considered the best-known and most standardized technology in use today for distributed computing over the Internet. "Web Services Foundations" is the first installment of a two-book collection covering the state-of-the-art of both theoretical and practical aspects of Web services and SOC research. This book specifically focuses on the foundations of Web services and SOC and covers - among others - Web service composition, non-functional aspects of Web services, Web service selection and recommendation, and assisted Web service composition. The editors collect advanced topics in the second book of the collection, "Advanced Web Services," (Springer, 2013). Both books together comprise approximately 1400 pages and are the result of an enormous community effort that involved more than 100 authors, comprising the world's leading experts in this field.

Advanced Web Services (Hardcover, 1st ed. 2014): Athman Bouguettaya, Quan Z. Sheng, Florian Daniel Advanced Web Services (Hardcover, 1st ed. 2014)
Athman Bouguettaya, Quan Z. Sheng, Florian Daniel
R3,092 Discovery Miles 30 920 Ships in 10 - 15 working days

Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application logic encapsulated by Web services. Web services could be considered the best-known and most standardized technology in use today for distributed computing over the Internet. This book is the second installment of a two-book collection covering the state-of-the-art of both theoretical and practical aspects of Web services and SOC research and deployments. Advanced Web Services specifically focuses on advanced topics of Web services and SOC and covers topics including Web services transactions, security and trust, Web service management, real-world case studies, and novel perspectives and future directions. The editors present foundational topics in the first book of the collection, Web Services Foundations (Springer, 2013). Together, both books comprise approximately 1400 pages and are the result of an enormous community effort that involved more than 100 authors, comprising the world's leading experts in this field.

Web Information Systems Engineering - Combined WISE 2011 and 2012 Workshops, Sydney, Australia, October 13-14, 2011 and Paphos,... Web Information Systems Engineering - Combined WISE 2011 and 2012 Workshops, Sydney, Australia, October 13-14, 2011 and Paphos, Cyprus, November 28-30, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Armin Haller, Guangyan Huang, Zhisheng Huang, Hye-Young Paik, Quan Z. Sheng
R1,580 Discovery Miles 15 800 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the combined workshops on Web Information Systems Engineering, WISE 2011 and WISE 2012, held in Sydney, Australia, in October 2011 and in Paphos, Cyprus, in November 2012. The seven workshops of WISE 2011-2012 have reported the recent developments and advances in the contemporary topics in the related fields of: Advanced Reasoning Technology for e-Science (ART 2012), Cloud-Enabled Business Process Management (CeBPM 2012), Engineering in the Semantic Enterprise (ESE 2012), Social Web Analysis for Trend Detection (SoWeTrend 2012), Big Data and Cloud (BDC 2012), Personalization in Cloud and Service Computing (PC-S 2011), and User-Focused Service Engineering, Consumption and Aggregation (USECA 2011).

Service-Oriented Computing - ICSOC Workshops 2012 - ICSOC 2012, International Workshops ASC, DISA, PAASC, SCEB, SeMaPS, and... Service-Oriented Computing - ICSOC Workshops 2012 - ICSOC 2012, International Workshops ASC, DISA, PAASC, SCEB, SeMaPS, and WESOA, and Satellite Events, Shanghai, China, November 12-15, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Aditya Ghose, Huibiao Zhu, Qi Yu, Alex Delis, Quan Z. Sheng, …
R1,616 Discovery Miles 16 160 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 2012 ICSOC Workshops consisting of 6 scientific satellite events, organized in 3 main tracks including workshop track (ASC, DISA. PAASC, SCEB, SeMaPS and WESOA 2012), PhD symposium track, demonstration track; held in conjunction with the 10th International Conference on Service-Oriented Computing (ICSOC), in Shanghai, China, November 2012. The 53 revised papers presents a wide range of topics that fall into the general area of service computing such as business process management, distributed systems, computer networks, wireless and mobile computing, grid computing, networking, service science, management science, and software engineering.

Web Technologies and Applications - 14th Asia-Pacific Web Conference, APWeb 2012, Kunming, China, April 11-13, Proceedings... Web Technologies and Applications - 14th Asia-Pacific Web Conference, APWeb 2012, Kunming, China, April 11-13, Proceedings (Paperback, 2012 ed.)
Quan Z. Sheng, Guoren Wang, Christian S. Jensen, Guandong Xu
R3,123 Discovery Miles 31 230 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th Asia-Pacific Conference APWeb 2012 held in Kunming, China, in April 2012. The 39 full papers presented together with 34 short papers, 2 keynote talks, and 5 demo papers were carefully reviewed and selected from 167 initial submissions. The papers cover contemporary topics in the fields of Web management and World Wide Web related research and applications, such as advanced application of databases, cloud computing, content management, data mining and knowledge discovery, distributed and parallel processing, grid computing, internet of things, semantic Web and Web ontology, security, privacy and trust, sensor networks, service-oriented computing, Web community analysis, Web mining and social networks.

Web Information Systems Engineering - WISE 2005 Workshops - WISE 2005 International Workshops, New York, NY, USA, November... Web Information Systems Engineering - WISE 2005 Workshops - WISE 2005 International Workshops, New York, NY, USA, November 20-22, 2005, Proceedings (Paperback, 2005 ed.)
Yuanbo Guo, Woochun Jun, Roland Kaschek, Shonati Krishnaswamy, Zhengxiang Pan, …
R1,656 Discovery Miles 16 560 Ships in 10 - 15 working days

This book constitutes the joint refereed proceedings of the three workshops held in conjunction with the 6th International Conference on Web Information Systems Engineering, WISE 2005, in New York, NY, USA, in November 2005.

A total of 47 papers were submitted to the three workshops, and 28 revised full papers were carefully selected for presentation. The workshop on Web Information Systems Quality (WISQ 2005) - discussing and disseminating research on the quality of WIS and Web services from a holistic point of view - included 7 papers out of 12 submissions. The workshop on Web-based Learning (WBL 2005) accounted for 10 papers from 14 papers submitted - organized in topical sections on tools, models, and innovative applications. The workshop on Scalable Semantic Web Knowledge Base Systems (SSWS 2005) included 11 presentations selected from 21 submissions. Topics addressed are scalable repository and reasoning services, practical Semantic Web applications, query handling and optimization techniques.

Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Hardcover): Brij B. Gupta, Quan Z.... Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Hardcover)
Brij B. Gupta, Quan Z. Sheng
R5,054 Discovery Miles 50 540 Ships in 12 - 17 working days

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.

Unique Radio Innovation for the 21st Century - Building Scalable and Global RFID Networks (Hardcover, 2011 Ed.): Damith C.... Unique Radio Innovation for the 21st Century - Building Scalable and Global RFID Networks (Hardcover, 2011 Ed.)
Damith C. Ranasinghe, Quan Z. Sheng, Sherali Zeadally
R1,855 Discovery Miles 18 550 Ships in 10 - 15 working days

Are you an engineer or a researcher developing RFID systems? Are you a manager considering deploying RFID-based applications? If so, this book is for you. Covering modern RFID systems, the challenges to RFID implementation are addressed using specific industrial research examples and common integration issues. The primary focus is on answering questions surrounding building scalable global Internet-based RFID networks. Key topics include RFID data management, RFID data processing and integration, Real-Time Locating Systems (RTLS) and sensors. The book considers the challenges of and solutions to building and exploiting global networks to guarantee one of the most important business drivers for modern RFID technology: traceability. The authors have drawn together RFID applications from the retail supply chain, asset and product lifecycle management, anti-counterfeiting and cold chain management to explore how global traceability networks can be created using RFID and sensor technologies. They present insights from world's leading research laboratories.

Data Quality and Trust in Big Data - 5th International Workshop, QUAT 2018, Held in Conjunction with WISE 2018, Dubai, UAE,... Data Quality and Trust in Big Data - 5th International Workshop, QUAT 2018, Held in Conjunction with WISE 2018, Dubai, UAE, November 12-15, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Hakim Hacid, Quan Z. Sheng, Tetsuya Yoshida, Azadeh Sarkheyli, Rui Zhou
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes revised selected papers from the International Workshop on Data Quality and Trust in Big Data, QUAT 2018, which was held in conjunction with the International Conference on Web Information Systems Engineering, WISE 2018, in Dubai, UAE, in November 2018. The 9 papers presented in this volume were carefully reviewed and selected from 15 submissions. They deal with novel ideas and solutions related to the problems of exploring, assessing, monitoring, improving, and maintaining the quality of data and trust for Big Data.

Advanced Data Mining and Applications - 12th International Conference, ADMA 2016, Gold Coast, QLD, Australia, December 12-15,... Advanced Data Mining and Applications - 12th International Conference, ADMA 2016, Gold Coast, QLD, Australia, December 12-15, 2016, Proceedings (Paperback, 1st ed. 2016)
Jinyan Li, Xue Li, Shuliang Wang, Jian-Xin Li, Quan Z. Sheng
R3,128 Discovery Miles 31 280 Ships in 10 - 15 working days

This book constitutes the proceedings of the 12th International Conference on Advanced Data Mining and Applications, ADMA 2016, held in Gold Coast, Australia, in December 2016. The 70 papers presented in this volume were carefully reviewed and selected from 105 submissions. The selected papers covered a wide variety of important topics in the area of data mining, including parallel and distributed data mining algorithms, mining on data streams, graph mining, spatial data mining, multimedia data mining, Web mining, the Internet of Things, health informatics, and biomedical data mining.

Service-Oriented Computing - 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedings... Service-Oriented Computing - 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedings (Paperback, 1st ed. 2016)
Quan Z. Sheng, Eleni Stroulia, Samir Tata, Sami Bhiri
R3,139 Discovery Miles 31 390 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th International Conference on Service-Oriented Computing, ICSOC 2016, held in Banff, AB, Canada, in October 2016. The 30 full papers presented together with 18 short papers and 8 industrial papers in this volume were carefully reviewed and selected from 137 submissions. The selected papers covered important topics in the area of service-oriented computing, including foundational issues on service discovery and service-systems design, business process modelling and management, economics of service-systems engineering, as well as services on the cloud, social networks, the Internet of Things (IoT), and data analytics.

Business Process Management Workshops - BPM 2018 International Workshops, Sydney, NSW, Australia, September 9-14, 2018, Revised... Business Process Management Workshops - BPM 2018 International Workshops, Sydney, NSW, Australia, September 9-14, 2018, Revised Papers (Paperback, 1st ed. 2019)
Florian Daniel, Quan Z. Sheng, Hamid Motahari
R1,652 Discovery Miles 16 520 Ships in 10 - 15 working days

This book constitutes revised papers from the eight International Workshops held at the 16th International Conference on Business Process Management, BPM 2018, in Sydney, Australia, in September 2018: BPI 2018: 14th International Workshop on Business Process Intelligence; BPMS2 2018: 11th Workshop on Social and Human Aspects of Business Process Management;- PODS4H 2018: 1st International Workshop on Process-Oriented Data Science for Healthcare; AI4BPM 2018: 1st International Workshop on Artificial Intelligence for Business Process Management; CCBPM 2018: 1st International Workshop on Emerging Computing Paradigms and Context in Business Process Management; BP-Meet-IoT / PQ 2018: Joint Business Processes Meet the Internet-of-Things and Process Querying Workshop; DeHMiMoP 2018: 1st Declarative/Decision/Hybrid Mining and Modelling for Business Processes Workshop; REBM /EdForum 2018: Joint Requirements Engineering and Business Process Management Workshop and Education Forum The 45 full papers presented in this volume were carefully reviewed and selected from 90 submissions.

Enabling Context-Aware Web Services - Methods, Architectures, and Technologies (Hardcover, New): Quan Z. Sheng, Jian Yu,... Enabling Context-Aware Web Services - Methods, Architectures, and Technologies (Hardcover, New)
Quan Z. Sheng, Jian Yu, Schahram Dustdar
R5,816 Discovery Miles 58 160 Ships in 12 - 17 working days

With recent advances in radio-frequency identification (RFID) technology, sensor networks, and enhanced Web services, the original World Wide Web is continuing its evolution into what is being called the Web of Things and Services. Such a Web will support an ultimately interactive environment where everyday physical objects such as buildings, sidewalks, and commodities become recognizable, addressable, and even controllable via a mostly ubiquitous Web. This integration of the physical and virtual worlds will fundamentally impact the way we live and in doing so afford tremendous new business opportunities with great human benefit, such as support services to keep the elderly independent, and intelligent traffic management that will cut wasted hours from every day. More efficient supply chains, improved environmental monitoring, better access to health services the list is endless.

Enabling Context-Aware Web Services: Methods, Architectures, and Technologies compiles the newest developments and advances driving this new age forward. With contributions from leading researchers across the world this pioneering work bridges the gap between context-awareness and Web services. A comprehensive presentation of what s already accomplished and what is possible, the chapters of this book are systematically organized into three major sections:

  • Methods focuses on the principle of context awareness in Web services and various ways to model those services at the specification level.
  • Architectures details the infrastructures, frameworks, and standards needed to build context-aware Web services.
  • Technologies presents a cornucopia of techniques adapted from once isolated research areas including semantic Web, database, and artificial intelligence development, as well as formal methods being employed to improve the development of context-aware Web services.

Researchers, engineers, entrepreneurs, and educators across any number of fields will find new ideas worth considering, jumping-off points for developing improved software and applications, and seeds for business ventures that efficiently deliver needed products, information, or services. The possibilities are as limitless as we dare to imagine.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bostik Glue Stick Value Pack (3 x 25g)
R61 R51 Discovery Miles 510
Bostik Glue Stick - Loose (25g)
R22 Discovery Miles 220
Cacharel Noa Eau De Toilette Spray…
R2,328 R1,154 Discovery Miles 11 540
Cape, Curry & Koesisters
Fatima Sydow, Gadija Sydow Noordien Paperback  (3)
R415 R357 Discovery Miles 3 570
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Professor Snape Wizard Wand - In…
 (8)
R832 Discovery Miles 8 320
Moon Bag [Black]
R57 Discovery Miles 570
Miss Peregrine's Home for Peculiar…
Eva Green, Asa Butterfield, … Blu-ray disc  (1)
R38 Discovery Miles 380
Jumbo Puzzle Mates Puzzle & Roll Storage…
 (4)
R699 R639 Discovery Miles 6 390
Mellerware Plastic Oscilating Floor Fan…
 (2)
R552 Discovery Miles 5 520

 

Partners