|
Showing 1 - 4 of
4 matches in All Departments
|
Web Information Systems and Applications - 15th International Conference, WISA 2018, Taiyuan, China, September 14-15, 2018, Proceedings (Paperback, 1st ed. 2018)
Xiaofeng Meng, Ruixuan Li, Kanliang Wang, Baoning Niu, Xin Wang, …
|
R1,627
Discovery Miles 16 270
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 15th
International Conference on Web Information Systems and
Applications, WISA 2018, held in Taiyuan, China, in September 2018.
The 29 full papers presented together with 16 short papers were
carefully reviewed and selected from 103 submissions. The papers
cover topics such as machine learning and data mining; cloud
computing and big data; information retrieval; natural language
processing; data privacy and security; knowledge graphs and social
networks; query processing; and recommendations.
|
Big Data Technology and Applications - First National Conference, BDTA 2015, Harbin, China, December 25-26, 2015. Proceedings (Paperback, 1st ed. 2016)
Wenguang Chen, Guisheng Yin, Gansen Zhao, Qilong Han, Weipeng Jing, …
|
R2,542
Discovery Miles 25 420
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the First
National Conference on Big Data Technology and Applications, BDTA
2015, held in Harbin, China, in December 2015. The 26 revised
papers presented were carefully reviewed and selected from numerous
submissions. The papers address issues such as the storage
technology of Big Data; analysis of Big Data and data mining;
visualization of Big Data; the parallel computing framework under
Big Data; the architecture and basic theory of Big Data; collection
and preprocessing of Big Data; innovative applications in some
areas, such as internet of things and cloud computing.
|
Cloud Computing - First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings (Paperback, 2009 ed.)
Martin Gilje Jaatun, Gansen Zhao, Chunming Rong
|
R3,094
Discovery Miles 30 940
|
Ships in 10 - 15 working days
|
This volume contains the proceedings of CloudCom 2009, the First
Inter- tional Conference on Cloud Computing. The conference was
held in Beijing, China, during December 1-4, 2009, and was the ?rst
in a series initiated by the Cloud Computing Association
(www.cloudcom.org). The Cloud Computing Association was founded in
2009 by Chunming Rong, Martin Gilje Jaatun, and Frode Eika Sandnes.
This ?rst conference was organized by the Beijing Ji- tong
University, Chinese Institute of Electronics, and Wuhan University,
and co-organized by Huazhong University of Science and Technology,
South China Normal University, and Sun Yat-sen University. Ever
since the inception of the Internet, a "Cloud" has been used as a
metaphor for a network-accessible infrastructure (e.g., data
storage, computing hardware, or entire networks) which is hidden
from users. To some, the concept of cloud computing may seem like a
throwback to the days of big mainframe computers, but we believe
that cloud computing makes data truly mobile, - lowing a user to
access services anywhere, anytime, with any Internet browser. In
cloud computing, IT-related capabilities are provided as services,
accessible without requiring control of, or even knowledge of, the
underlying technology. Cloud computing provides dynamic scalability
of services and computing power, and although many mature
technologies are used as components in cloud c- puting, there are
still many unresolved and open problems.
This book contains the proceedings of the 2nd EuroPKI Workshop -
EuroPKI 2005, held at the University of Kent in the city of
Canterbury, UK, 30 June-1 July 2005. The workshop was informal and
lively, and the university setting encouragedactive
exchangesbetween the speakersand the audience.
TheworkshopprogramcomprisedakeynotespeechfromDr.CarlisleAdams,
followedby18refereedpapers,
withaworkshopdinnerinandguidedtouraround the historic Dover Castle.
Dr. Adams is well known for his contributions to the CAST family of
s- metric encryption algorithms, to international standards from
the IETF, ISO, and OASIS, authorship of over 30 refereed journals
and conference papers, and co-authorship of Understanding PKI:
Concepts, Standards, and Deployment Considerations
(Addison-Wesley). Dr. Adams keynote speech was entitled 'PKI: Views
from the Dispassionate "I,"' in which he presented his thoughts on
why PKIhas been availableas an authentication technology for many
years now, but has only enjoyed large-scale success in fairly
limited contexts to date. He also presented his thoughts on the
possible future(s) of this technology, with emp- sis on the major
factors hindering adoption and some potential directions for future
research in these areas. In response to the Call for Papers, 43
workshop papers were submitted in total. All papers were blind
reviewed by at least two members of the Program Committee, the
majority having 3 reviewers, with a few borderline papers h- ing 4
or more reviewers; 18 papers were accepted for presentation in 8
sessions.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|