0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Big Data Technology and Applications - First National Conference, BDTA 2015, Harbin, China, December 25-26, 2015. Proceedings... Big Data Technology and Applications - First National Conference, BDTA 2015, Harbin, China, December 25-26, 2015. Proceedings (Paperback, 1st ed. 2016)
Wenguang Chen, Guisheng Yin, Gansen Zhao, Qilong Han, Weipeng Jing, …
R2,248 Discovery Miles 22 480 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First National Conference on Big Data Technology and Applications, BDTA 2015, held in Harbin, China, in December 2015. The 26 revised papers presented were carefully reviewed and selected from numerous submissions. The papers address issues such as the storage technology of Big Data; analysis of Big Data and data mining; visualization of Big Data; the parallel computing framework under Big Data; the architecture and basic theory of Big Data; collection and preprocessing of Big Data; innovative applications in some areas, such as internet of things and cloud computing.

Cloud Computing - First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings (Paperback,... Cloud Computing - First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings (Paperback, 2009 ed.)
Martin Gilje Jaatun, Gansen Zhao, Chunming Rong
R2,770 Discovery Miles 27 700 Ships in 18 - 22 working days

This volume contains the proceedings of CloudCom 2009, the First Inter- tional Conference on Cloud Computing. The conference was held in Beijing, China, during December 1-4, 2009, and was the ?rst in a series initiated by the Cloud Computing Association (www.cloudcom.org). The Cloud Computing Association was founded in 2009 by Chunming Rong, Martin Gilje Jaatun, and Frode Eika Sandnes. This ?rst conference was organized by the Beijing Ji- tong University, Chinese Institute of Electronics, and Wuhan University, and co-organized by Huazhong University of Science and Technology, South China Normal University, and Sun Yat-sen University. Ever since the inception of the Internet, a "Cloud" has been used as a metaphor for a network-accessible infrastructure (e.g., data storage, computing hardware, or entire networks) which is hidden from users. To some, the concept of cloud computing may seem like a throwback to the days of big mainframe computers, but we believe that cloud computing makes data truly mobile, - lowing a user to access services anywhere, anytime, with any Internet browser. In cloud computing, IT-related capabilities are provided as services, accessible without requiring control of, or even knowledge of, the underlying technology. Cloud computing provides dynamic scalability of services and computing power, and although many mature technologies are used as components in cloud c- puting, there are still many unresolved and open problems.

Public Key Infrastructure - Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-... Public Key Infrastructure - Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30- July 1, 2005, Revised Selected Papers (Paperback, 2005 ed.)
David Chadwick, Gansen Zhao
R1,488 Discovery Miles 14 880 Ships in 18 - 22 working days

This book contains the proceedings of the 2nd EuroPKI Workshop - EuroPKI 2005, held at the University of Kent in the city of Canterbury, UK, 30 June-1 July 2005. The workshop was informal and lively, and the university setting encouragedactive exchangesbetween the speakersand the audience. TheworkshopprogramcomprisedakeynotespeechfromDr.CarlisleAdams, followedby18refereedpapers, withaworkshopdinnerinandguidedtouraround the historic Dover Castle. Dr. Adams is well known for his contributions to the CAST family of s- metric encryption algorithms, to international standards from the IETF, ISO, and OASIS, authorship of over 30 refereed journals and conference papers, and co-authorship of Understanding PKI: Concepts, Standards, and Deployment Considerations (Addison-Wesley). Dr. Adams keynote speech was entitled 'PKI: Views from the Dispassionate "I,"' in which he presented his thoughts on why PKIhas been availableas an authentication technology for many years now, but has only enjoyed large-scale success in fairly limited contexts to date. He also presented his thoughts on the possible future(s) of this technology, with emp- sis on the major factors hindering adoption and some potential directions for future research in these areas. In response to the Call for Papers, 43 workshop papers were submitted in total. All papers were blind reviewed by at least two members of the Program Committee, the majority having 3 reviewers, with a few borderline papers h- ing 4 or more reviewers; 18 papers were accepted for presentation in 8 sessions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Organic Semiconductor Heterojunctions…
Dongge Ma, Yonghua Chen Hardcover R3,246 Discovery Miles 32 460
Proceedings of the Second International…
Emmanuel E Gdoutos Hardcover R5,198 Discovery Miles 51 980
Nuclear and Radiochemistry
Jozsef Konya, Noemi M. Nagy Paperback R3,936 R3,619 Discovery Miles 36 190
The Investigation of Plastic Behavior by…
Yinan Cui Hardcover R3,204 Discovery Miles 32 040
Broken - Picking up the Pieces After the…
Paul Murray Hardcover R809 Discovery Miles 8 090
Democracy amid Crises - Polarization…
Matthew Levendusky, Josh Pasek, … Hardcover R2,490 Discovery Miles 24 900
Glory - Expanding God's Presence…
Bill Vincent Paperback R417 Discovery Miles 4 170
Party Politics in Russia and Ukraine…
Bryon Moraski Hardcover R2,733 Discovery Miles 27 330
A Laboratory Guide to the Tight Junction
Jianghui Hou Paperback R3,032 Discovery Miles 30 320
Kingdom Prosperity
Barbara S Gore Hardcover R460 Discovery Miles 4 600

 

Partners