Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 32 matches in All Departments
With the evolution of technology and sudden growth in the number of smart vehicles, traditional Vehicular Ad hoc NETworks (VANETs) face several technical challenges in deployment and management due to less flexibility, scalability, poor connectivity, and inadequate intelligence. VANETs have raised increasing attention from both academic research and industrial aspects resulting from their important role in driving assistant system. Vehicular Ad Hoc Networks focuses on recent advanced technologies and applications that address network protocol design, low latency networking, context-aware interaction, energy efficiency, resource management, security, human-robot interaction, assistive technology and robots, application development, and integration of multiple systems that support Vehicular Networks and smart interactions. Simulation is a key tool for the design and evaluation of Intelligent Transport Systems (ITS) that take advantage of communication-capable vehicles in order to provide valuable safety, traffic management, and infotainment services. It is widely recognized that simulation results are only significant when realistic models are considered within the simulation tool chain. However, quite often research works on the subject are based on simplistic models unable to capture the unique characteristics of vehicular communication networks. The support that different simulation tools offer for such models is discussed, as well as the steps that must be undertaken to fine-tune the model parameters in order to gather realistic results. Moreover, the book provides handy hints and references to help determine the most appropriate tools and models. This book will promote best simulation practices in order to obtain accurate results.
The QL&SC 2012 is a major symposium for scientists, and practitioners all around the world to present their latest researches, results, ideas, developments and applications in such areas as quantitative logic, many-valued logic, fuzzy logic, quantification of software, artificial intelligence, fuzzy sets and systems and soft computing.This invaluable book provides a broad introduction to the fuzzy reasoning and soft computing. It is certain one should not go too far in approximation and optimization, and a certain degree must be kept in mind. This is the essential idea of quantitative logic and soft computing.The explanations in the book are complete to provide the necessary background material needed to go further into the subject and explore the research literature. It is suitable reading for graduate students. It provides a platform for mutual exchanges from top experts and scholars around the world in this field.
Security and Privacy Issues in Internet of Medical Things addresses the security challenges faced by healthcare providers and patients. As IoMT devices are vulnerable to cyberattacks, and a security breach through IoMT devices may act as a pathway for hackers to enter hospital networks, the book covers a very timely topic. The incorporation of blockchain in the healthcare environment has given birth to the Internet of Medical Things (IoMT), which consists of a collection of healthcare systems that espouse groundbreaking technologies. Systems consist of inter-linked sensors, wearable technology devices and clinical frameworks that perform explicit, secure machine-to-machine and cloud platform communications. The significance of IoMT in the field of healthcare is undoubtedly a win-win situation for patients through technology enhancements and a collection of analytics that helps in better diagnosis and treatment. Due to higher accuracy levels, IoMT devices are more reliable in reporting and data tracking and help avoid human errors and incorrect reporting.
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019, held in Atlanta, GA, USA in July 2019. The 37 full papers were carefully reviewed and selected from 109 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
This book constitutes the refereed proceedings of six symposiums and two workshops co-located with SpaCCS 2019, the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 26 full papers were carefully reviewed and selected from 75 submissions. This year's symposiums and workshops are: SPIoT 2019 - Security and Privacy of Internet of Things; TSP 2019 - Trust, Security and Privacy for Emerging Applications; SCS 2019 - Sensor-Cloud Systems; UbiSafe 2019 - UbiSafe Computing; ISSR 2019 - Security in e-Science and e-Research; CMRM 2019 - Cybersecurity Metrics and Risk Modeling.
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The total of 75 papers presented in this volume was carefully reviewed and selected from a total of 190 submissions to all workshops: UbiSafe 2017: The 9th IEEE International Symposium on UbiSafe Computing ISSR 2017: The 9th IEEE International Workshop on Security in e-Science and e-Research TrustData 2017: The 8th International Workshop on Trust, Security and Privacy for Big Data TSP 2017: The 7th International Symposium on Trust, Security and Privacy for Emerging Applications SPIoT 2017: The 6th International Symposium on Security and Privacy on Internet of Things NOPE 2017: The 5th International Workshop on Network Optimization and Performance Evaluation DependSys 2017: The Third International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications SCS 2017: The Third International Symposium on Sensor-Cloud Systems WCSSC 2017: The Second International Workshop on Cloud Storage Service and Computing MSCF 2017: The First International Symposium on Multimedia Security and Digital Forensics SPBD 2017: The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.
The two volume set LNCS 7439 and 7440 comprises the proceedings of the 12th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2012, as well as some workshop papers of the CDCN 2012 workshop which was held in conjunction with this conference. The 40 regular paper and 26 short papers included in these proceedings were carefully reviewed and selected from 156 submissions. The CDCN workshop attracted a total of 19 original submissions, 8 of which are included in part II of these proceedings. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental results, and commercial components and systems.
The two volume set LNCS 7439 and 7440 comprises the proceedings of the 12th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2012, as well as some workshop papers of the CDCN 2012 workshop which was held in conjunction with this conference. The 40 regular paper and 26 short papers included in these proceedings were carefully reviewed and selected from 156 submissions. The CDCN workshop attracted a total of 19 original submissions, 8 of which are included in part II of these proceedings. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental results, and commercial components and systems.
ThisvolumecontainstheproceedingsofATC2009, the6thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality. The conference was held in Brisbane, A- tralia, during July 7-9, 2009. The conference was technically co-sponsored by the IEEE and the IEEE Computer Society Technical Committee on Scalable Computing. ATC 2009 was accompanied by three workshops on a variety of research challenges within the area of autonomic and trusted computing. ATC 2009 is a successor of the First International Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES 2005, Japan), the International Workshop on Trusted and Autonomic Computing Systems (TACS 2006, Austria), the Third International Conference on Autonomic and Trusted Computing (ATC 2006, China), the 4th International Conference on Autonomic and Trusted Computing (ATC 2007, Hong Kong), and the 5th International Conference on Autonomic and Trusted Computing (ATC 2008, Norway) Computing systems including hardware, software, communication and n- worksaregrowingdramaticallyinbothscale andheterogeneity, becoming overly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing focuses on se- manageable computing and communication systems that exhibit self-awareness, self-con?guration, self-optimization, self-healing, self-protection and other self-x operationsto the maximumextent possible without humaninterventionorgu- ance. Organiccomputingadditionallyemphasizesnatural-analogueconceptslike self-organization and controlled emergence. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and to retain con?dence that the system will not fa
After toppling the Ming dynasty, the Qing conquerors forced Han Chinese males to adopt Manchu hairstyle and clothing. Yet China's new rulers tolerated the use of traditional Chinese attire in performances, making theater one of the only areas of life where Han garments could still be seen and where Manchu rule could be contested. Staging Personhood uncovers a hidden history of the Ming-Qing transition by exploring what it meant for the clothing of a deposed dynasty to survive onstage. Reading dramatic works against Qing sartorial regulations, Guojun Wang offers an interdisciplinary lens on the entanglements between Chinese drama and nascent Manchu rule in seventeenth-century China. He reveals not just how political and ethnic conflicts shaped theatrical costuming but also the ways costuming enabled different modes of identity negotiation during the dynastic transition. In case studies of theatrical texts and performances, Wang considers clothing and costumes as indices of changing ethnic and gender identities. He contends that theatrical costuming provided a productive way to reconnect bodies, clothes, and identities disrupted by political turmoil. Through careful attention to a variety of canonical and lesser-known plays, visual and performance records, and historical documents, Staging Personhood provides a pathbreaking perspective on the cultural dynamics of early Qing China.
This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks.
This book constitutes seven refereed workshops and symposiums, SpaCCS Workshops 2020, which are held jointly with the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, in Nanjing, China, in December 2020. The 48 papers were carefully reviewed and selected from 131 submissions and cover a broad range of topics on security, privacy and anonymity in computation communication, and storage, including the 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020), the 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020), the 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020), the 6th International Symposium on Sensor-Cloud Systems (SCS 2020), the Second International Workshop on Communication, Computing, Informatics and Security (CCIS 2020), the First International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020), the First International Symposium on Emerging Information Security and Applications (EISA 2020).
Biomedical Engineering Tools for Management of Patients with COVID-19 presents biomedical engineering tools under research (and in development) that can be used for the management of COVID-19 patients, along with BME tools in the global environment that curtail and prevent the spread of the virus. BME tools covered in the book include new disinfectants and sterilization equipment, testing devices for rapid and accurate COVID-19 diagnosis, Internet of Things applications in COVID-19 hospitals, analytics, Data Science and statistical modeling applied to COVID-19 tracking, Smart City instruments and applications, and more. Later sections discuss smart tools in telemedicine and e-health. Biomedical engineering tools can provide engineers, computer scientists, clinicians and other policymakers with solutions for managing patient treatment, applying data analysis techniques, and applying tools to help the general population curtail spread of the virus.
This book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, held in Nanjing, China, in December 2020. The 30 full papers were carefully reviewed and selected from 88 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. SpaCCS 2020 is held jointly with the 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020), the 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020), the 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020), the 6th International Symposium on Sensor-Cloud Systems (SCS 2020), the 2nd International Workshop on Communication, Computing, Informatics and Security (CCIS 2020), the First International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020), the First International Symposium on Emerging Information Security and Applications (EISA 2020).
This book constitutes the proceedings of the 17th International Conference on Web Information Systems and Applications, WISA 2020, held in Guangzhou, China, in September 2020. The 42 full papers and 16 short papers presented were carefully reviewed and selected from 165 submissions. The papers are grouped in topical sections on world wide web, recommendation, query processing and algorithm, natural language processing, machine learning, graph query, edge computing and data mining, data privacy and security, and blockchain.
This book constitutes the refereed proceedings of the 7th International Conference on Smart City and Informatization, iSCI 2019, held in Guangzhou, China, in November 2019. The volume presents 52 full papers, which were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on Internet of Things (IoT) and smart sensing; urban computing and big data; smart society informatization technologies; cloud/edge/fog computing for smart city; applications for smart city informatization; assistive engineering and information technology; cyberspace security; blockchain and applications.
This book constitutes the refereed proceedings of the 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys, held in Guangzhou, China, in November 2019. The volume presents 39 full papers, which were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on dependability and security fundamentals and technologies; dependable and secure systems; dependable and secure applications; dependability and security measures and assessments; explainable artificial inteligence for cyberspace.
This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 45 revised full papers were carefully reviewed and selected from 120 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
This book constitutes the refereed proceedings of the 9th International Conference on on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016. The 40 papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical sections including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
This book constitutes the refereed proceedings of the 10th Asia-Pacific Services Computing Conference, APSCC 2016, held in Zhangjiajie, China, in November 2016. The 38 revised full papers presented in this book were carefully reviewed and selected from 107 submissions. The papers cover a wide range of topics in the fields of cloud/utility/Web computing/big data; foundations of services computing; social/peer-to-peer/mobile/ubiquitous/pervasive computing; service-centric computing models; integration of telecommunication SOA and Web services; business process integration and management; and security in services.
This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and Privacy for Big Data, TrustData 2016; the 6th International Symposium on Trust, Security and Privacy for Emerging Applications, TSP 2016; the 4th International Workshop on Network Optimization and Performance Evaluation, NOPE 2016; the Second International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys 2016; the Annual Big Data Security, Privacy and Trust Workshop, BigDataSPT 2016; and the First International Workshop on Cloud Storage Service and Computing, WCSSC 2016. The 37 full papers presented were carefully reviewed and selected from 95 submissions. The papers deal with research findings, ideas and emerging trends in information security research and cover a broad range of topics in security, privacy and anonymity in computation, communication and storage.
This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications. |
You may like...
|