0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Big Data Technology and Applications - First National Conference, BDTA 2015, Harbin, China, December 25-26, 2015. Proceedings... Big Data Technology and Applications - First National Conference, BDTA 2015, Harbin, China, December 25-26, 2015. Proceedings (Paperback, 1st ed. 2016)
Wenguang Chen, Guisheng Yin, Gansen Zhao, Qilong Han, Weipeng Jing, …
R2,248 Discovery Miles 22 480 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First National Conference on Big Data Technology and Applications, BDTA 2015, held in Harbin, China, in December 2015. The 26 revised papers presented were carefully reviewed and selected from numerous submissions. The papers address issues such as the storage technology of Big Data; analysis of Big Data and data mining; visualization of Big Data; the parallel computing framework under Big Data; the architecture and basic theory of Big Data; collection and preprocessing of Big Data; innovative applications in some areas, such as internet of things and cloud computing.

Cloud Computing - First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings (Paperback,... Cloud Computing - First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings (Paperback, 2009 ed.)
Martin Gilje Jaatun, Gansen Zhao, Chunming Rong
R2,770 Discovery Miles 27 700 Ships in 18 - 22 working days

This volume contains the proceedings of CloudCom 2009, the First Inter- tional Conference on Cloud Computing. The conference was held in Beijing, China, during December 1-4, 2009, and was the ?rst in a series initiated by the Cloud Computing Association (www.cloudcom.org). The Cloud Computing Association was founded in 2009 by Chunming Rong, Martin Gilje Jaatun, and Frode Eika Sandnes. This ?rst conference was organized by the Beijing Ji- tong University, Chinese Institute of Electronics, and Wuhan University, and co-organized by Huazhong University of Science and Technology, South China Normal University, and Sun Yat-sen University. Ever since the inception of the Internet, a "Cloud" has been used as a metaphor for a network-accessible infrastructure (e.g., data storage, computing hardware, or entire networks) which is hidden from users. To some, the concept of cloud computing may seem like a throwback to the days of big mainframe computers, but we believe that cloud computing makes data truly mobile, - lowing a user to access services anywhere, anytime, with any Internet browser. In cloud computing, IT-related capabilities are provided as services, accessible without requiring control of, or even knowledge of, the underlying technology. Cloud computing provides dynamic scalability of services and computing power, and although many mature technologies are used as components in cloud c- puting, there are still many unresolved and open problems.

Public Key Infrastructure - Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-... Public Key Infrastructure - Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30- July 1, 2005, Revised Selected Papers (Paperback, 2005 ed.)
David Chadwick, Gansen Zhao
R1,488 Discovery Miles 14 880 Ships in 18 - 22 working days

This book contains the proceedings of the 2nd EuroPKI Workshop - EuroPKI 2005, held at the University of Kent in the city of Canterbury, UK, 30 June-1 July 2005. The workshop was informal and lively, and the university setting encouragedactive exchangesbetween the speakersand the audience. TheworkshopprogramcomprisedakeynotespeechfromDr.CarlisleAdams, followedby18refereedpapers, withaworkshopdinnerinandguidedtouraround the historic Dover Castle. Dr. Adams is well known for his contributions to the CAST family of s- metric encryption algorithms, to international standards from the IETF, ISO, and OASIS, authorship of over 30 refereed journals and conference papers, and co-authorship of Understanding PKI: Concepts, Standards, and Deployment Considerations (Addison-Wesley). Dr. Adams keynote speech was entitled 'PKI: Views from the Dispassionate "I,"' in which he presented his thoughts on why PKIhas been availableas an authentication technology for many years now, but has only enjoyed large-scale success in fairly limited contexts to date. He also presented his thoughts on the possible future(s) of this technology, with emp- sis on the major factors hindering adoption and some potential directions for future research in these areas. In response to the Call for Papers, 43 workshop papers were submitted in total. All papers were blind reviewed by at least two members of the Program Committee, the majority having 3 reviewers, with a few borderline papers h- ing 4 or more reviewers; 18 papers were accepted for presentation in 8 sessions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Emerging Practices in Telehealth - Best…
Andrew M. Freeman, Ami Bhatt Paperback R2,937 Discovery Miles 29 370
Deceitful Media - Artificial…
Simone Natale Hardcover R2,435 Discovery Miles 24 350
Multi-Agent-Based Simulations Applied to…
Diana Francisca Adamatti Hardcover R5,213 Discovery Miles 52 130
Intelligent Edge Computing for Cyber…
D. Jude Hemanth, Bb Gupta, … Paperback R2,954 Discovery Miles 29 540
Computational Medicine in Data Mining…
Goran Rakocevic, Tijana Djukic, … Hardcover R4,302 R3,496 Discovery Miles 34 960
Hierarchical Feature Selection for…
Cen Wan Hardcover R2,639 Discovery Miles 26 390
Handbook of Research on Investigations…
Maki Habib Hardcover R6,605 Discovery Miles 66 050
Machine Learning and Data Mining
I Kononenko, M Kukar Paperback R1,903 Discovery Miles 19 030
Interval-Valued Methods in…
Urszula Bentkowska Hardcover R2,653 Discovery Miles 26 530
Unmanned Aerial Vehicles and…
Bella Mary I. Thusnavis, K Martin Sagayam, … Hardcover R6,677 Discovery Miles 66 770

 

Partners