Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 16 of 16 matches in All Departments
This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies.
This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network.
This volume constitutes the refereed proceedings of the Second International Conference on Multimedia and Signal Processing, CMSP 2012, held in Shanghai, China, in December 2012. The 79 full papers included in the volume were selected from 328 submissions from 10 different countries and regions. The papers are organized in topical sections on computer and machine vision, feature extraction, image enhancement and noise filtering, image retrieval, image segmentation, imaging techniques & 3D imaging, pattern recognition, multimedia systems, architecture, and applications, visualization, signal modeling, identification & prediction, speech & language processing, time-frequency signal analysis.
This book constitutes the refereed proceedings of the International Conference on Artificial Intelligence and Computational Intelligence, AICI 2012, held in Chengdu, China, in October 2012. The 163 revised full papers presented were carefully reviewed and selected from 724 submissions. The papers are organized in topical sections on applications of artificial intelligence; applications of computational intelligence; data mining and knowledge discovering; evolution strategy; intelligent image processing; machine learning; neural networks; pattern recognition.
The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012. The 87 revised full papers presented were carefully reviewed and selected from 418 submissions. The papers are organized in topical sections on applications of Web information systems; applications of Web mining; e-government and e-commerce; information security; intelligent networked systems; management information systems; mobile computing; semantic Web and ontologies; Web information extraction; Web intelligence; Web interfaces and applications; and XML and semi-structured data.
This volume proceedings contains revised selected papers from the 4th International Conference on Artificial Intelligence and Computational Intelligence, AICI 2012, held in Chengdu, China, in October 2012. The total of 163 high-quality papers presented were carefully reviewed and selected from 724 submissions. The papers are organized into topical sections on applications of artificial intelligence, applications of computational intelligence, data mining and knowledge discovery, evolution strategy, expert and decision support systems, fuzzy computation, information security, intelligent control, intelligent image processing, intelligent information fusion, intelligent signal processing, machine learning, neural computation, neural networks, particle swarm optimization, and pattern recognition.
This book constitutes, together with LNAI 7002, LNAI 7003, and LNAI 7004, the refereed proceedings of the International Conference on Artificial Intelligence and ComputationaI Intelligence, AICI 2011, held in Taiyuan, China, in September 2011. The 265 revised full papers presented in the four volumes were carefully reviewed and selected from 1073 submissions. The 83 papers presented in this volume are organized in topical sections on applications of artificial intelligence; applications of computational intelligence; automated problem solving; brain models/cognitive science; data mining and knowledge discovering; expert and decision support systems; fuzzy logic and soft computing; intelligent agents and systems; intelligent control; intelligent image processing; intelligent scheduling; intelligent signal processing; natural language processing; nature computation; neural computation; pattern recognition; rough set theory.
The two-volume set LNCS 6987 and LNCS 6988 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2011, held in Taiyuan, China, in September 2011. The 112 revised full papers presented were carefully reviewed and selected from 472 submissions. The first volume includes 56 papers organized in the following topical sections: applications on Web information systems; applications of Web mining; distributed systems; e-government and e-commerce; geographic information systems; information security; and intelligent networked systems.
This three-volume proceedings contains revised selected papers from
the Second International Conference on Artificial Intelligence and
Computational Intelligence, AICI 2011, held in Taiyuan, China, in
September 2011.
This three-volume proceedings contains revised selected papers from
the Second International Conference on Artificial Intelligence and
Computational Intelligence, AICI 2011, held in Taiyuan, China, in
September 2011.
The two-volume set LNCS 6987 and 6988 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2011, held in Taiyuan, China, in September 2011. The 112 revised full papers presented were carefully reviewed and selected from 472 submissions. The second volume includes 56 papers organized in the following topical sections: management information systems; semantic Web and ontologies; Web content mining; Web information classification; Web information extraction; Web intelligence; Web interfaces and applications; Web services and e-learning; and XML and semi-structured data.
This three-volume proceedings contains revised selected papers from
the Second International Conference on Artificial Intelligence and
Computational Intelligence, AICI 2011, held in Taiyuan, China, in
September 2011.
The 2009 International Conference on Artificial Intelligence and Computational Int- ligence (AICI 2009) was held during November 7-8, 2009 in Shanghai, China. The technical program of the conference reflects the tremendous growth in the fields of artificial intelligence and computational intelligence with contributions from a large number of participants around the world. AICI 2009 received 1,203 submissions from 20 countries and regions. After rig- ous reviews, 79 high-quality papers were selected for this volume, representing an acceptance rate of 6.6%. These selected papers cover many new developments and their applications in the fields of artificial intelligence and computational intelligence. Their publications reflect a sustainable interest from the wide academic community worldwide in tirelessly pursuing new solutions through effective utilizations of arti- cial intelligence and computational intelligence to real-world problems. We would like to specially thank all the committee members and reviewers, without whose timely help it would have been impossible to review all the submitted papers to assemble this program. We also would like take this opportunity to express our heartfelt appreciation for all those who worked together in organizing this conference, establi- ing the technical programs and running the conference meetings. We greatly appreciate the authors, speakers, invited session organizers, session Chairs, and others who made this conference possible. Lastly, we would like to express our gratitude to the Shanghai University of Electric Power for the sponsorship and support of the conference.
This book constitutes, together with LNCS 6987 and LNCS 6988, the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2011, held in Taiyuan, China, in September 2011. The 112 revised full papers presented in the three volumes were carefully reviewed and selected from 472 submissions. The 61 papers presented in this volume are organized in topical sections on applications of artificial intelligence; applications of computational intelligence; automated problem solving; brain models/cognitive science; data mining and knowledge discovering; expert and decision support systems; fuzzy logic and soft computing; intelligent agents and systems; intelligent control; intelligent image processing; intelligent scheduling; intelligent signal processing; natural language processing; nature computation; neural computation; pattern recognition; rough set theory.
This book constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2009, held in Shanghai, China, on November 7-8, 2009. The 61 revised full papers presented in this volume were carefully reviewed and selected from 598 submissions. The papers are organized in topical sections on web infomation retrieval, web information extraction, web information classification, web mining, semantic web and ontologies, applications, XML and semi-structured data, web services, intelligent networked systems, information security, E-learning, E-commerce, and distributed systems.
The 2010 International Conference on Artificial Intelligence and Computational Intelligence (AICI 2010) was held October 23-24, 2010 in Sanya, China. The AICI 2010 received 1,216 submissions from 20 countries and regions. After rigorous reviews, 105 high-quality papers were selected for publication in the AICI 2010 proceedings. The acceptance rate was 8%. The aim of AICI 2010 was to bring together researchers working in many different areas of artificial intelligence and computational intelligence to foster the exchange of new ideas and promote international collaborations. In addition to the large number of submitted papers and invited sessions, there were several internationally well-known keynote speakers. On behalf of the Organizing Committee, we thank Hainan Province Institute of Computer and Qiongzhou University for its sponsorship and logistics support. We also thank the members of the Organizing Committee and the Program Committee for their hard work. We are very grateful to the keynote speakers, invited session organizers, session chairs, reviewers, and student helpers. Last but not least, we thank all the authors and participants for their great contributions that made this conference possible.
|
You may like...
Revealing Revelation - How God's Plans…
Amir Tsarfati, Rick Yohn
Paperback
(5)
|