Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 5 of 5 matches in All Departments
When deployed as infrastructure components of real-time business processes, service computing applications we rely on for our daily activities elicit the proper addressing of performance and dependability issues. While recent developments in service-oriented architectures have come a long way in many aspects, ranging from semantics and ontologies to frameworks and design processes, performance and dependability remains a research demanding field. Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions highlights current technological trends and related research issues in dedicated chapters without restricting their scope. This book focuses on performance and dependability issues associated with service computing and these two complementary aspects, which include concerns of quality of service (QoS), real-time constraints, security, reliability and other important requirements when it comes to integrating services into real-world business processes and critical applications.
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.
This book constitutes revised selected papers from the workshops held at 24th International Conference on Parallel and Distributed Computing, Euro-Par 2018, which took place in Turin, Italy, in August 2018. The 64 full papers presented in this volume were carefully reviewed and selected from 109 submissions. Euro-Par is an annual, international conference in Europe, covering all aspects of parallel and distributed processing. These range from theory to practice, from small to the largest parallel and distributed systems and infrastructures, from fundamental computational problems to full-edged applications, from architecture, compiler, language and interface design and implementation to tools, support infrastructures, and application performance aspects.
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops: - AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security - AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security - AIoTS: 4th ACNS Workshop on Artificial Intelligence and Industrial IoT Security - CIMSS: 2nd ACNS Workshop on Critical Infrastructure and Manufacturing System Security - Cloud S&P: 4th ACNS Workshop on Cloud Security and Privacy - SCI: 3rd ACNS Workshop on Secure Cryptographic Implementation - SecMT: 3rd ACNS Workshop on Security in Mobile Technologies - SiMLA: 4th ACNS Workshop on Security in Machine Learning and its Applications
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.
|
You may like...
|