![]() |
![]() |
Your cart is empty |
||
Showing 1 - 4 of 4 matches in All Departments
This book constitutes the refereed proceedings of the 15th International Conference on Web Information Systems and Applications, WISA 2018, held in Taiyuan, China, in September 2018. The 29 full papers presented together with 16 short papers were carefully reviewed and selected from 103 submissions. The papers cover topics such as machine learning and data mining; cloud computing and big data; information retrieval; natural language processing; data privacy and security; knowledge graphs and social networks; query processing; and recommendations.
This book constitutes the refereed proceedings of the First National Conference on Big Data Technology and Applications, BDTA 2015, held in Harbin, China, in December 2015. The 26 revised papers presented were carefully reviewed and selected from numerous submissions. The papers address issues such as the storage technology of Big Data; analysis of Big Data and data mining; visualization of Big Data; the parallel computing framework under Big Data; the architecture and basic theory of Big Data; collection and preprocessing of Big Data; innovative applications in some areas, such as internet of things and cloud computing.
This volume contains the proceedings of CloudCom 2009, the First Inter- tional Conference on Cloud Computing. The conference was held in Beijing, China, during December 1-4, 2009, and was the ?rst in a series initiated by the Cloud Computing Association (www.cloudcom.org). The Cloud Computing Association was founded in 2009 by Chunming Rong, Martin Gilje Jaatun, and Frode Eika Sandnes. This ?rst conference was organized by the Beijing Ji- tong University, Chinese Institute of Electronics, and Wuhan University, and co-organized by Huazhong University of Science and Technology, South China Normal University, and Sun Yat-sen University. Ever since the inception of the Internet, a "Cloud" has been used as a metaphor for a network-accessible infrastructure (e.g., data storage, computing hardware, or entire networks) which is hidden from users. To some, the concept of cloud computing may seem like a throwback to the days of big mainframe computers, but we believe that cloud computing makes data truly mobile, - lowing a user to access services anywhere, anytime, with any Internet browser. In cloud computing, IT-related capabilities are provided as services, accessible without requiring control of, or even knowledge of, the underlying technology. Cloud computing provides dynamic scalability of services and computing power, and although many mature technologies are used as components in cloud c- puting, there are still many unresolved and open problems.
This book contains the proceedings of the 2nd EuroPKI Workshop - EuroPKI 2005, held at the University of Kent in the city of Canterbury, UK, 30 June-1 July 2005. The workshop was informal and lively, and the university setting encouragedactive exchangesbetween the speakersand the audience. TheworkshopprogramcomprisedakeynotespeechfromDr.CarlisleAdams, followedby18refereedpapers, withaworkshopdinnerinandguidedtouraround the historic Dover Castle. Dr. Adams is well known for his contributions to the CAST family of s- metric encryption algorithms, to international standards from the IETF, ISO, and OASIS, authorship of over 30 refereed journals and conference papers, and co-authorship of Understanding PKI: Concepts, Standards, and Deployment Considerations (Addison-Wesley). Dr. Adams keynote speech was entitled 'PKI: Views from the Dispassionate "I,"' in which he presented his thoughts on why PKIhas been availableas an authentication technology for many years now, but has only enjoyed large-scale success in fairly limited contexts to date. He also presented his thoughts on the possible future(s) of this technology, with emp- sis on the major factors hindering adoption and some potential directions for future research in these areas. In response to the Call for Papers, 43 workshop papers were submitted in total. All papers were blind reviewed by at least two members of the Program Committee, the majority having 3 reviewers, with a few borderline papers h- ing 4 or more reviewers; 18 papers were accepted for presentation in 8 sessions.
|
![]() ![]() You may like...
Revealing Revelation - How God's Plans…
Amir Tsarfati, Rick Yohn
Paperback
![]()
|