![]() |
![]() |
Your cart is empty |
||
Showing 1 - 14 of 14 matches in All Departments
This book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives. The proposed framework consists of five interacting components that directly target at the primary IP violations. All the five algorithms are developed based on rigorous mathematical modeling for primary IP violations and focus on different stages of IC design, which can be combined to provide a formal security guarantee.
This book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives. The proposed framework consists of five interacting components that directly target at the primary IP violations. All the five algorithms are developed based on rigorous mathematical modeling for primary IP violations and focus on different stages of IC design, which can be combined to provide a formal security guarantee.
This volume brings together cutting-edge research from emerging and senior scholars alike representing a variety of disciplines that bears on human preferences for fairness, equity and justice. Despite predictions derived from evolutionary and economic theories that individuals will behave in the service of maximizing their own utility and survival, humans not only behave cooperatively, but in many instances, truly altruistically, giving to unrelated others at a cost to themselves. Humans also seem preoccupied like no other species with issues of fairness, equity and justice. But what exactly is fair and how are norms of fairness maintained? How should we decide, and how do we decide, between equity and efficiency? How does the idea of fairness translate across cultures? What is the relationship between human evolution and the development of morality? The collected chapters shed light on these questions and more to advance our understanding of these uniquely human concerns. Structured on an increasing scale, this volume begins by exploring issues of fairness, equity, and justice in a micro scale, such as the neural basis of fairness, and then progresses by considering these issues in individual, family, and finally cultural and societal arenas. Importantly, contributors are drawn from fields as diverse as anthropology, neuroscience, behavioral economics, bioethics, and psychology. Thus, the chapters provide added value and insights when read collectively, with the ultimate goal of enhancing the distinct disciplines as they investigate similar research questions about prosociality. In addition, particular attention is given to experimental research approaches and policy implications for some of society's most pressing issues, such as allocation of scarce medical resources and moral development of children. Thought-provoking and informative, Interdisciplinary Perspectives on Fairness, Equity, and Justice is a valuable read for public policy makers, anthropologists, ethicists, psychologists, neuroscientists, and all those interested in these questions about the essence of human nature.
The book Handheld Total Chemical and Biological Analysis Systems: Bridging NMR, Digital Microfluidics, and Semiconductors centers on the complete design of Nuclear Magnetic Resonance (NMR) microsystems for in vitro chemical and biological assays based on semiconductor chips and portable magnet. Different sensing mechanisms for CMOS in vitro assay are compared, key design criteria of the CMOS transceiver for NMR measurement are revealed, and system-level optimizations of the CMOS NMR platform utilizing digital microfluidic and diverse functions of the CMOS technology are discussed. Two CMOS NMR platforms are implemented, each of these focuses on different aspect of optimization.
This volume brings together cutting-edge research from emerging and senior scholars alike representing a variety of disciplines that bears on human preferences for fairness, equity and justice. Despite predictions derived from evolutionary and economic theories that individuals will behave in the service of maximizing their own utility and survival, humans not only behave cooperatively, but in many instances, truly altruistically, giving to unrelated others at a cost to themselves. Humans also seem preoccupied like no other species with issues of fairness, equity and justice. But what exactly is fair and how are norms of fairness maintained? How should we decide, and how do we decide, between equity and efficiency? How does the idea of fairness translate across cultures? What is the relationship between human evolution and the development of morality? The collected chapters shed light on these questions and more to advance our understanding of these uniquely human concerns. Structured on an increasing scale, this volume begins by exploring issues of fairness, equity, and justice in a micro scale, such as the neural basis of fairness, and then progresses by considering these issues in individual, family, and finally cultural and societal arenas. Importantly, contributors are drawn from fields as diverse as anthropology, neuroscience, behavioral economics, bioethics, and psychology. Thus, the chapters provide added value and insights when read collectively, with the ultimate goal of enhancing the distinct disciplines as they investigate similar research questions about prosociality. In addition, particular attention is given to experimental research approaches and policy implications for some of society's most pressing issues, such as allocation of scarce medical resources and moral development of children. Thought-provoking and informative, Interdisciplinary Perspectives on Fairness, Equity, and Justice is a valuable read for public policy makers, anthropologists, ethicists, psychologists, neuroscientists, and all those interested in these questions about the essence of human nature.
This book constitutes the workshop proceedings of the 18th International Conference on Database Systems for Advanced Applications, DASFAA 2013, held in Wuhan, China, in April 2013. The volume contains three workshops, each focusing on specific area that contributes to the main themes of the DASFAA conference: The First International Workshop on Big Data Management and Analytics (BDMA 2013), the Third International Workshop on Social Networks and Social Web (SNSM 2013) and the International Workshop on Semantic Computing and Personalization (SeCoP 2013).
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.
The book focuses on the research methods of networked control systems via sliding mode. The problems with network disturbances, network induced delay, out-of-sequence and packet loss, and network attacks are studied in detail. The content studied in this book is introduced in detail and is verified by simulation or experiment. It is especially suitable for readers who are interested in learning the control scheme of networked systems. This book can benefit researchers, engineers, and students in related fields such as electrical, control, automation, and cyber security.
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.
The book focuses on the research methods of networked control systems via sliding mode. The problems with network disturbances, network induced delay, out-of-sequence and packet loss, and network attacks are studied in detail. The content studied in this book is introduced in detail and is verified by simulation or experiment. It is especially suitable for readers who are interested in learning the control scheme of networked systems. This book can benefit researchers, engineers, and students in related fields such as electrical, control, automation, and cyber security.
This book focuses on picturing B-IoT techniques from a few perspectives, which are architecture, key technologies, security and privacy, service models and framework, practical use cases and more. Main contents of this book derive from most updated technical achievements or breakthroughs in the field. A number of representative IoT service offerings will be covered by this book, such as vehicular networks, document sharing system, and telehealth. Both theoretical and practical contents will be involved in this book in order to assist readers to have a comprehensive and deep understanding the mechanism of using blockchain for powering up IoT systems. The blockchain-enabled Internet of Things (B-IoT) is deemed to be a novel technical alternative that provides network-based services with additional functionalities, benefits, and implementations in terms of decentralization, immutability, and auditability. Towards the enhanced secure and privacy-preserving Internet of Things (IoT), this book introduces a few significant aspects of B-IoT, which includes fundamental knowledge of both blockchain and IoT, state-of-the-art reviews of B-IoT applications, crucial components in the B-IoT system and the model design, and future development potentials and trends. IoT technologies and services, e.g. cloud data storage technologies and vehicular services, play important roles in wireless technology developments. On the other side, blockchain technologies are being adopted in a variety of academic societies and professional realms due to its promising characteristics. It is observable that the research and development on integrating these two technologies will provide critical thinking and solid references for contemporary and future network-relevant solutions. This book targets researchers and advanced level students in computer science, who are focused on cryptography, cloud computing and internet of things, as well as electrical engineering students and researchers focused on vehicular networks and more. Professionals working in these fields will also find this book to be a valuable resource.
Carbon dots (CDs) as an emerging carbon nanomaterial have attracted considerable attention and have been widely used in numerous fields. When compared with semiconductor quantum dots and organic dyes, CDs are a very friendly optical probe with low toxicity, good biocompatibility and good anti-photobleaching. These qualities give them the potential to be greener than other types of quantum dots and organic dyes. Covering several common synthesis strategies, including biomass synthesis, large-scale synthesis and sustainable synthesis technology, this book focuses on the green synthesis of CDs and their applications in the fields of bioanalytical, catalytic, biomedical, and environmental sciences. It is a useful reference for anyone working in green chemistry, analytical chemistry, biomedical or environmental science.
This book focuses on picturing B-IoT techniques from a few perspectives, which are architecture, key technologies, security and privacy, service models and framework, practical use cases and more. Main contents of this book derive from most updated technical achievements or breakthroughs in the field. A number of representative IoT service offerings will be covered by this book, such as vehicular networks, document sharing system, and telehealth. Both theoretical and practical contents will be involved in this book in order to assist readers to have a comprehensive and deep understanding the mechanism of using blockchain for powering up IoT systems. The blockchain-enabled Internet of Things (B-IoT) is deemed to be a novel technical alternative that provides network-based services with additional functionalities, benefits, and implementations in terms of decentralization, immutability, and auditability. Towards the enhanced secure and privacy-preserving Internet of Things (IoT), this book introduces a few significant aspects of B-IoT, which includes fundamental knowledge of both blockchain and IoT, state-of-the-art reviews of B-IoT applications, crucial components in the B-IoT system and the model design, and future development potentials and trends. IoT technologies and services, e.g. cloud data storage technologies and vehicular services, play important roles in wireless technology developments. On the other side, blockchain technologies are being adopted in a variety of academic societies and professional realms due to its promising characteristics. It is observable that the research and development on integrating these two technologies will provide critical thinking and solid references for contemporary and future network-relevant solutions. This book targets researchers and advanced level students in computer science, who are focused on cryptography, cloud computing and internet of things, as well as electrical engineering students and researchers focused on vehicular networks and more. Professionals working in these fields will also find this book to be a valuable resource.
|
![]() ![]() You may like...
Terminator 6: Dark Fate
Linda Hamilton, Arnold Schwarzenegger
Blu-ray disc
![]() R79 Discovery Miles 790
|