Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 14 of 14 matches in All Departments
This book presents the proceedings of the Conference on Algorithms and Applications (ALAP 2018), which focuses on various areas of computing, like distributed systems and security, big data and analytics and very-large-scale integration (VLSI) design. The book provides solutions to a broad class of problems in diverse areas of algorithms in our daily lives in a world designed for, and increasingly controlled by algorithms. Written by eminent personalities from academia and industry, the papers included offer insights from a number of perspectives, providing an overview of the state of the art in the field. The book consists of invited talks by respected speakers, papers presented in technical sessions, and tutorials to offer ideas, results, work-in-progress and experiences of various algorithmic aspects of computational science and engineering.
This book presents the proceedings of the Conference on Algorithms and Applications (ALAP 2018), which focuses on various areas of computing, like distributed systems and security, big data and analytics and very-large-scale integration (VLSI) design. The book provides solutions to a broad class of problems in diverse areas of algorithms in our daily lives in a world designed for, and increasingly controlled by algorithms. Written by eminent personalities from academia and industry, the papers included offer insights from a number of perspectives, providing an overview of the state of the art in the field. The book consists of invited talks by respected speakers, papers presented in technical sessions, and tutorials to offer ideas, results, work-in-progress and experiences of various algorithmic aspects of computational science and engineering.
This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for Security, GameSec 2013, held in Fort Worth, TX, USA, in November 2013. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. The conference focuses on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. At the same time, the connection between theoretical models and real world security problems are emphasized to establish the important feedback loop between theory and practice. Observing the scarcity of venues for researchers who try to develop a deeper theoretical understanding of the underlying incentive and resource allocation issues in security, we believe that GameSec will fill an important void and serve as a distinguished forum of highest standards for years to come.
Recent advances in cutting-edge wireless communication and computing te- nologies have paved the way for the proliferation of ubiquitous infrastructure and infrastructureless wireless networks. These emerging networks are enabling a broad spectrum of applications ranging from critical infrastructure prot- tion and security, to environment monitoring, health care, and quality of life. The need to deal with the complexity and rami?cations of the ever-growing mobile users and services, however, is intensifying the interest in the devel- ment of sound fundamental principles, novel algorithmic approaches, rigorous and repeatable design methodologies, and systematic evaluation frameworks for next-generation wireless networks. The Third International Conference on Wireless Algorithms, Systems and Applications (WASA) was held in Dallas, TX, USA during October 26-28. The objective of WASA is to address the research and development e?orts of va- ous issues in the area of algorithms, systems and applications for current and next-generationinfrastructureandinfrastructurelesswirelessnetworks. Thec- ference is structured to provide a forum for researchers and practitioners, from the academic, industrial, and governmental sectors, with a unique opportunity to discussandexpresstheirviews onthe currenttrends, challenges, andstate-- the-artsolutionsaddressingvariousissuesrelatedtocurrentandnext-generation wireless networks. Following a rigorous review process, the Program Committee selected an outstanding set of 35 papers for publication in the proceedings and oral presentations at the conference. The program of WASA 2008 also included three keynote talks by Lionel Ni, Ty Znati, and Jie Wu along with 15 invited paper
This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2006, held in Hong Kong, China in December 2006. The 73 revised full papers were carefully reviewed and selected from a total of 254 submissions. The papers address all current issues in mobile ad hoc and sensor networks and are organized in topical sections on routing, network protocols, security, energy efficiency, data processing, and deployment.
Last, but not least, thanks to all the participants and authors. We hope that they enjoyed the workshop as much as the wonderful and culturally vibrant city of Kolkata Bhabani P. Sinha Indian Statistical Institute, Kolkata, India December 2004 Sajal K. Das University of Texas, Arlington, USA December 2004 Program Chairs' Message On behalf of the Technical Program Committee of the 6th International Wo- shop on Distributed Computing, IWDC 2004, it was our great pleasure to w- come the attendees to Kolkata, India. Over the last few years, IWDC has emerged as an internationally renowned forum for interaction among researchers from academia and industries around the world. A clear indicator of this fact is the large number of high-quality submissions of technical papers received by the workshop this year. The workshop program consisted of 12 technical sessions with 54 contributed papers, two keynote addresses, four tutorials, a panel, a poster session and the Prof.A.K.ChoudhuryMemorialLecture.TheIWDCProgramCommittee, c- prising 38 distinguished members, worked hard to organize the technical p- gram. Following a rigorous review process, out of 157 submissions only 54 - pers were accepted for presentation in the technical sessions; 27 of the accepted papers were classi?ed as regular papers and the remaining 27 as short papers. Another 11 papers were accepted for presentation in the poster session, each with a one-page abstract appearing in the proceedings.
This book constitutes the refereed proceedings of the 5th International Workshop on Distributed Computing, IWDC 2003, held in Kolkata, India in December 2003. The 32 revised full papers presented together with five invited papers were carefully reviewed and selected from a total of 105 submissions. The papers are organized in topical sections on distributed algorithms, internetworking and web, parallel and distributed systems, wireless and mobile networking, ad-hoc and sensor networks, learning and optimization, and optical networking
This book constitutes the refereed proceedings of the 4th International Workshop on Distributed Computing, IWDC 2002, held in Calcutta, India, in December 2002. The 31 revised full papers and 3 student papers presented together with 3 keynote papers were carefully reviewed and selected from more than 90 submissions. The papers are organized in topical sections on Web caching, distributed computing, wireless networks, wireless mobile systems, VLSI and parallel systems, optical networks, and distributed systems.
This unique introduction to the foundational concepts of cyber-physical systems (CPS) describes key design principles and emerging research trends in detail. Several interdisciplinary applications are covered, with a focus on the wide-area management of infrastructures including electric power systems, air transportation networks, and health care systems. Design, control and optimization of cyber-physical infrastructures are discussed, addressing security and privacy issues of networked CPS, presenting graph-theoretic and numerical approaches to CPS evaluation and monitoring, and providing readers with the knowledge needed to operate CPS in a reliable, efficient, and secure manner. Exercises are included. This is an ideal resource for researchers and graduate students in electrical engineering and computer science, as well as for practitioners using cyber-physical systems in aerospace and automotive engineering, medical technology, and large-scale infrastructure operations.
The worldwide reach of the Internet allows malicious cyber
criminals to coordinate and launch attacks on both cyber and
cyber-physical infrastructure from anywhere in the world. This
purpose of this handbook is to introduce the theoretical
foundations and practical solution techniques for securing critical
cyber and physical infrastructures as well as their underlying
computing and communication architectures and systems. Examples of
such infrastructures include utility networks (e.g., electrical
power grids), ground transportation systems (automotives, roads,
bridges and tunnels), airports and air traffic control systems,
wired and wireless communication and sensor networks, systems for
storing and distributing water and food supplies, medical and
healthcare delivery systems, as well as financial, banking and
commercial transaction assets. The handbook focus mostly on the
scientific foundations and engineering techniques - while also
addressing the proper integration of policies and access control
mechanisms, for example, how human-developed policies can be
properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout
The three-volume set LNCS 12937 - 12939 constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021. The conference took place in Nanjing, China.The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. The following topics are covered in Part I of the set: network protocols, signal processing, wireless telecommunication systems, blockchain, IoT and edge computing, artificial intelligence, computer security, distributed computer systems, machine learning, and others.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021, in Nanjing, China.The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. Part III of the set includes the papers of the contributors that took part in the workshops co-located with the conference.The following topics are covered in the volume: network protocols, signal processing, wireless telecommunication systems, routing algorithms, cryptography, local area networks, and others.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021. The conference took place in Nanjing, China.The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. The contributions in Part II of the set are subdivided into the following topical sections: Scheduling & Optimization II; Security; Data Center Networks and Cloud Computing; Privacy-Aware Computing; Internet of Vehicles; Visual Computing for IoT; Mobile Ad-Hoc Networks.
|
You may like...
The Bomb - South Africa's Nuclear…
Nic Von Wielligh, Wielligh-Steyn von
Paperback
R768
Discovery Miles 7 680
1 Recce: Volume 3 - Through Stealth Our…
Alexander Strachan
Paperback
Ratels Aan Die Lomba - Die Storie Van…
Leopold Scholtz
Paperback
(4)
|