0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Big Data Technology and Applications - First National Conference, BDTA 2015, Harbin, China, December 25-26, 2015. Proceedings... Big Data Technology and Applications - First National Conference, BDTA 2015, Harbin, China, December 25-26, 2015. Proceedings (Paperback, 1st ed. 2016)
Wenguang Chen, Guisheng Yin, Gansen Zhao, Qilong Han, Weipeng Jing, …
R2,248 Discovery Miles 22 480 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First National Conference on Big Data Technology and Applications, BDTA 2015, held in Harbin, China, in December 2015. The 26 revised papers presented were carefully reviewed and selected from numerous submissions. The papers address issues such as the storage technology of Big Data; analysis of Big Data and data mining; visualization of Big Data; the parallel computing framework under Big Data; the architecture and basic theory of Big Data; collection and preprocessing of Big Data; innovative applications in some areas, such as internet of things and cloud computing.

Cloud Computing - First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings (Paperback,... Cloud Computing - First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings (Paperback, 2009 ed.)
Martin Gilje Jaatun, Gansen Zhao, Chunming Rong
R2,770 Discovery Miles 27 700 Ships in 18 - 22 working days

This volume contains the proceedings of CloudCom 2009, the First Inter- tional Conference on Cloud Computing. The conference was held in Beijing, China, during December 1-4, 2009, and was the ?rst in a series initiated by the Cloud Computing Association (www.cloudcom.org). The Cloud Computing Association was founded in 2009 by Chunming Rong, Martin Gilje Jaatun, and Frode Eika Sandnes. This ?rst conference was organized by the Beijing Ji- tong University, Chinese Institute of Electronics, and Wuhan University, and co-organized by Huazhong University of Science and Technology, South China Normal University, and Sun Yat-sen University. Ever since the inception of the Internet, a "Cloud" has been used as a metaphor for a network-accessible infrastructure (e.g., data storage, computing hardware, or entire networks) which is hidden from users. To some, the concept of cloud computing may seem like a throwback to the days of big mainframe computers, but we believe that cloud computing makes data truly mobile, - lowing a user to access services anywhere, anytime, with any Internet browser. In cloud computing, IT-related capabilities are provided as services, accessible without requiring control of, or even knowledge of, the underlying technology. Cloud computing provides dynamic scalability of services and computing power, and although many mature technologies are used as components in cloud c- puting, there are still many unresolved and open problems.

Public Key Infrastructure - Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-... Public Key Infrastructure - Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30- July 1, 2005, Revised Selected Papers (Paperback, 2005 ed.)
David Chadwick, Gansen Zhao
R1,488 Discovery Miles 14 880 Ships in 18 - 22 working days

This book contains the proceedings of the 2nd EuroPKI Workshop - EuroPKI 2005, held at the University of Kent in the city of Canterbury, UK, 30 June-1 July 2005. The workshop was informal and lively, and the university setting encouragedactive exchangesbetween the speakersand the audience. TheworkshopprogramcomprisedakeynotespeechfromDr.CarlisleAdams, followedby18refereedpapers, withaworkshopdinnerinandguidedtouraround the historic Dover Castle. Dr. Adams is well known for his contributions to the CAST family of s- metric encryption algorithms, to international standards from the IETF, ISO, and OASIS, authorship of over 30 refereed journals and conference papers, and co-authorship of Understanding PKI: Concepts, Standards, and Deployment Considerations (Addison-Wesley). Dr. Adams keynote speech was entitled 'PKI: Views from the Dispassionate "I,"' in which he presented his thoughts on why PKIhas been availableas an authentication technology for many years now, but has only enjoyed large-scale success in fairly limited contexts to date. He also presented his thoughts on the possible future(s) of this technology, with emp- sis on the major factors hindering adoption and some potential directions for future research in these areas. In response to the Call for Papers, 43 workshop papers were submitted in total. All papers were blind reviewed by at least two members of the Program Committee, the majority having 3 reviewers, with a few borderline papers h- ing 4 or more reviewers; 18 papers were accepted for presentation in 8 sessions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Glycans in Diseases and Therapeutics
Mauro S. G. Pavao Hardcover R4,014 Discovery Miles 40 140
Iron Flame - The Empyrean: Book 2
Rebecca Yarros Hardcover R610 R533 Discovery Miles 5 330
The Pancreatic Beta Cell, Volume 95
Gerald Litwack Hardcover R4,529 Discovery Miles 45 290
Crescent City: 3-Book Collection - House…
Sarah J. Maas Paperback R1,035 R700 Discovery Miles 7 000
Singular Loci of Schubert Varieties
Sara Sarason, V. Lakshmibai Hardcover R3,717 Discovery Miles 37 170
Pairs of Compact Convex Sets…
Diethard Ernst Pallaschke, R. Urbanski Hardcover R1,572 Discovery Miles 15 720
Foliations on Riemannian Manifolds and…
Vladimir Rovenski Hardcover R2,810 Discovery Miles 28 100
The Geometry of Higher-Order Hamilton…
R. Miron Hardcover R2,671 Discovery Miles 26 710
GED Test 5-Hour Quick Prep For Dummies
Tim Collins R400 R377 Discovery Miles 3 770
The Lebesgue-Stieltjes Integral - A…
M. Carter, B Van Brunt Hardcover R1,873 Discovery Miles 18 730

 

Partners