0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 22 of 22 matches in All Departments

Malicious Attack Propagation and Source Identification (Hardcover, 1st ed. 2019): Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu,... Malicious Attack Propagation and Source Identification (Hardcover, 1st ed. 2019)
Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, …
R3,513 Discovery Miles 35 130 Ships in 10 - 15 working days

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.

Cooperative OFDM Underwater Acoustic Communications (Hardcover, 1st ed. 2016): Xilin Cheng, Liuqing Yang, Xiang Cheng Cooperative OFDM Underwater Acoustic Communications (Hardcover, 1st ed. 2016)
Xilin Cheng, Liuqing Yang, Xiang Cheng
R3,268 Discovery Miles 32 680 Ships in 10 - 15 working days

Following underwater acoustic channel modeling, this book investigates the relationship between coherence time and transmission distances. It considers the power allocation issues of two typical transmission scenarios, namely short-range transmission and medium-long range transmission. For the former scenario, an adaptive system is developed based on instantaneous channel state information. The primary focus is on cooperative dual-hop orthogonal frequency division multiplexing (OFDM).This book includes the decomposed fountain codes designed to enable reliable communications with higher energy efficiency. It covers the Doppler Effect, which improves packet transmission reliability for effective low-complexity mirror-mapping-based intercarrier interference cancellation schemes capable of suppressing the intercarrier interference power level. Designed for professionals and researchers in the field of underwater acoustic communications, this book is also suitable for advanced-level students in electrical engineering or computer science.

Dynamic and Advanced Data Mining for Progressing Technological Development - Innovations and Systemic Approaches (Hardcover):... Dynamic and Advanced Data Mining for Progressing Technological Development - Innovations and Systemic Approaches (Hardcover)
A. B. M. Shawkat Ali, Yang Xiang
R4,783 Discovery Miles 47 830 Ships in 12 - 17 working days

Overcoming many challenges, data mining has already established discipline capability in many domains. ""Dynamic and Advanced Data Mining for Progressing Technological Development: Innovations and Systemic Approaches"" discusses advances in modern data mining research in today's rapidly growing global and technological environment. A critical mass of the most sought after knowledge, this publication serves as an important reference tool to leading research within information search and retrieval techniques.

Probabilistic Reasoning in Multiagent Systems - A Graphical Models Approach (Hardcover): Yang Xiang Probabilistic Reasoning in Multiagent Systems - A Graphical Models Approach (Hardcover)
Yang Xiang
R3,336 R3,068 Discovery Miles 30 680 Save R268 (8%) Ships in 12 - 17 working days

Probalistic reasoning with graphical models, also known as Bayesian networks or belief networks, has become an active field of research and practice in artifical intelligence, operations research and statistics in the last two decades. The success of this technique in modeling intelligent decision support systems under the centralized and single-agent paradim has been striking. In this book, the author extends graphical dependence models to the distributed and multi-agent paradigm. He identifies the major technical challenges involved in such an endeavor and presents the results gleaned from a decade's research.

Linear Systems - Non-Fragile Control and Filtering (Paperback): Guang-Hong Yang, Xiang-Gui Guo, Wei-Wei Che, Wei Guan Linear Systems - Non-Fragile Control and Filtering (Paperback)
Guang-Hong Yang, Xiang-Gui Guo, Wei-Wei Che, Wei Guan
R2,259 Discovery Miles 22 590 Ships in 12 - 17 working days

Linear Systems: Non-Fragile Control and Filtering presents the latest research results and a systematic approach to designing non-fragile controllers and filters for linear systems. The authors combine the algebraic Riccati technique, the linear matrix inequality (LMI) technique, and the sensitivity analysis method to establish a set of new non-fragile (insensitive) control methods. This proposed method can optimize the closed-loop system performance and make the designed controllers or filters tolerant of coefficient variations in controller or filter gain matrices. A Systematic Approach to Designing Non-Fragile Controllers and Filters for Linear Systems The text begins with developments and main research methods in non-fragile control. It then systematically presents novel methods for non-fragile control and filtering of linear systems with respect to additive/multiplicative controller/filter gain uncertainties. The book introduces the algebraic Riccati equation technique to solve additive/multiplicative norm-bounded controller/filter gain uncertainty, and proposes a structured vertex separator to deal with the numerical problem resulting from interval-bounded coefficient variations. It also explains how to design insensitive controllers and filters in the framework of coefficient sensitivity theory. Throughout, the book includes numerical examples to demonstrate the effectiveness of the proposed design methods. More Effective Design Methods for Non-Fragile Controllers and Filters The design and analysis tools described will help readers to better understand and analyze parameter uncertainties and to design more effective non-fragile controllers and filters. Providing a coherent approach, this book is a valuable reference for researchers, graduate students, and anyone who wants to explore the area of non-fragile control and filtering.

Internet and Distributed Computing Systems - 11th International Conference, IDCS 2018, Tokyo, Japan, October 11-13, 2018,... Internet and Distributed Computing Systems - 11th International Conference, IDCS 2018, Tokyo, Japan, October 11-13, 2018, Proceedings (Paperback, 1st ed. 2018)
Yang Xiang, Jingtao Sun, Giancarlo Fortino, Antonio Guerrieri, Jason J. Jung
R1,475 Discovery Miles 14 750 Ships in 10 - 15 working days

This book constitutes the proceedings of the 11th International Conference on Internet and Distributed Computing Systems, IDCS 2018, held in Tokyo, Japan, in October 2018. The 21 full papers presented together with 5 poster and 2 short papers in this volume were carefully reviewed and selected from 40 submissions. This conference desired to look for inspiration in diverse areas (e.g., infrastructure and system design, software development, big data, control theory, artificial intelligence, IoT, self-adaptation, emerging models, paradigms, applications and technologies related to Internet-based distributed systems) to develop new ways to design and mange such complex and adaptive computation resources.

Cloud Computing, Security, Privacy in New Computing Environments - 7th International Conference, CloudComp 2016, and First... Cloud Computing, Security, Privacy in New Computing Environments - 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016, Proceedings (Paperback, 1st ed. 2018)
Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, …
R2,152 Discovery Miles 21 520 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016.The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016 focuses on security and privacy aspects of new computing environments including mobile computing, big data, cloud computing and other large-scale environments.

Testbeds and Research Infrastructures for the Development of Networks and Communities - 11th International Conference,... Testbeds and Research Infrastructures for the Development of Networks and Communities - 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Song Guo, Guiyi Wei, Yang Xiang, Xiaodong Lin, Pascal Lorenz
R1,728 Discovery Miles 17 280 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2016, held in Hangzhou, China, in June 2016. The 16 papers were carefully selected from 25 submissions and provide a forum about technologies of big data, cyber physical systems and computer communications. The papers cover future Internet and software defined networks, network testbed design and implementation, testbed for network applications, and QoS/QoE in networks.

Probabilistic Reasoning in Multiagent Systems - A Graphical Models Approach (Paperback): Yang Xiang Probabilistic Reasoning in Multiagent Systems - A Graphical Models Approach (Paperback)
Yang Xiang
R1,304 Discovery Miles 13 040 Ships in 12 - 17 working days

This 2002 book investigates the opportunities in building intelligent decision support systems offered by multi-agent distributed probabilistic reasoning. Probabilistic reasoning with graphical models, also known as Bayesian networks or belief networks, has become increasingly an active field of research and practice in artificial intelligence, operations research and statistics. The success of this technique in modeling intelligent decision support systems under the centralized and single-agent paradigm has been striking. Yang Xiang extends graphical dependence models to the distributed and multi-agent paradigm. He identifies the major technical challenges involved in such an endeavor and presents the results. The framework developed in the book allows distributed representation of uncertain knowledge on a large and complex environment embedded in multiple cooperative agents, and effective, exact and distributed probabilistic inference.

Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings... Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings (Paperback, 2012 ed.)
Yang Xiang, Javier Lopez, C.-C.Jay Kuo, Wanlei Zhou
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Australia, in December 2012. The 30 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 105 submissions. The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn systems, network and cloud security, wireless security, security protocols and models.

Data and Knowledge Engineering - Third International Conference, ICDKE 2012, Wuyishan, China, November 21-23, 2012, Proceedings... Data and Knowledge Engineering - Third International Conference, ICDKE 2012, Wuyishan, China, November 21-23, 2012, Proceedings (Paperback, 2012 ed.)
Yang Xiang, Mukaddim Pathan, Xiaohui Tao, Hua Wang
R1,868 Discovery Miles 18 680 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Data and Knowledge Engineering, ICDKE 2012, held in Wuyishan, Fujian, China, in November 2012. The conference was co-located with the 6th International Conference on Network and System Security, NSS 2012. The 13 revised full papers of ICDKE 2012 were carefully reviewed and selected from 53 submissions. The papers cover the following topics: artificial intelligence and data engineering; knowledge discovery and data management; information extraction and retrieval and data security.

Internet and Distributed Computing Systems - 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23,... Internet and Distributed Computing Systems - 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedings (Paperback, 2012 ed.)
Yang Xiang, Mukaddim Pathan, Xiaohui Tao, Hua Wang
R1,352 Discovery Miles 13 520 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Internet and Distributed Computing Systems, IDCS 2012, held in Wuyishan, Fujian, China, in November 2012. The conference was co-located with the 6th International Conference on Network and System Security, NSS 2012. The 22 revised full papers of IDCS 2012 presented were carefully reviewed and selected from 80 submissions. The papers cover the following topics: ad-hoc and sensor networks; internet and Web technologies; network operations and management; information infrastructure; resilience; fault tolerance and availability.

Algorithms and Architectures for Parallel Processing - 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September... Algorithms and Architectures for Parallel Processing - 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part I (Paperback, 2012 ed.)
Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, …
R1,555 Discovery Miles 15 550 Ships in 10 - 15 working days

The two volume set LNCS 7439 and 7440 comprises the proceedings of the 12th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2012, as well as some workshop papers of the CDCN 2012 workshop which was held in conjunction with this conference. The 40 regular paper and 26 short papers included in these proceedings were carefully reviewed and selected from 156 submissions. The CDCN workshop attracted a total of 19 original submissions, 8 of which are included in part II of these proceedings. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental results, and commercial components and systems.

Algorithms and Architectures for Parallel Processing - 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September... Algorithms and Architectures for Parallel Processing - 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part II (Paperback, 2012 ed.)
Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, …
R1,487 Discovery Miles 14 870 Ships in 10 - 15 working days

The two volume set LNCS 7439 and 7440 comprises the proceedings of the 12th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2012, as well as some workshop papers of the CDCN 2012 workshop which was held in conjunction with this conference. The 40 regular paper and 26 short papers included in these proceedings were carefully reviewed and selected from 156 submissions. The CDCN workshop attracted a total of 19 original submissions, 8 of which are included in part II of these proceedings. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental results, and commercial components and systems.

Advances in Artificial Intelligence - 16th Conference of the Canadian Society for Computational Studies of Intelligence, AI... Advances in Artificial Intelligence - 16th Conference of the Canadian Society for Computational Studies of Intelligence, AI 2003, Halifax, Canada, June 11-13, 2003, Proceedings (Paperback, 2003 ed.)
Yang Xiang, Chaib-Draa Brahim
R3,097 Discovery Miles 30 970 Ships in 10 - 15 working days

  This book constitutes the refereed proceedings of the 16th Conference of the Canadian Society for Computational Studies of Intelligence, AI 2003, held in Halifax, Canada in June2003. The 30 revised full papers and 24 revised short papers presented were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on knowledge representation, search, constraint satisfaction, machine learning and data mining, AI and Web applications, reasoning under uncertainty, agents and multi-agent systems, AI and bioinformatics, and AI and e-commerce.  

Software Similarity and Classification (Paperback, 2012 ed.): Silvio Cesare, Yang Xiang Software Similarity and Classification (Paperback, 2012 ed.)
Silvio Cesare, Yang Xiang
R1,414 Discovery Miles 14 140 Ships in 10 - 15 working days

Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each application and demonstrates that considering these applied problems as a similarity and classification problem enables techniques to be shared between areas. Additionally, the authors present in-depth case studies using the software similarity and classification techniques developed throughout the book.

Security and Privacy in Social Networks and Big Data - 6th International Symposium, SocialSec 2020, Tianjin, China, September... Security and Privacy in Social Networks and Big Data - 6th International Symposium, SocialSec 2020, Tianjin, China, September 26-27, 2020, Proceedings (Paperback, 1st ed. 2020)
Yang Xiang, Zheli Liu, Jin Li
R1,517 Discovery Miles 15 170 Ships in 10 - 15 working days

This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security.

Web and Big Data - First International Joint Conference, APWeb-WAIM 2017, Beijing, China, July 7-9, 2017, Proceedings, Part I... Web and Big Data - First International Joint Conference, APWeb-WAIM 2017, Beijing, China, July 7-9, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Lei Chen, Christian S. Jensen, Cyrus Shahabi, Xiaochun Yang, Xiang Lian
R1,585 Discovery Miles 15 850 Ships in 10 - 15 working days

This two -volume set, LNCS 10366 and 10367, constitutes the thoroughly refereed proceedings of the First International Joint Conference, APWeb-WAIM 2017, held in Beijing, China in July 2017. The 44 full papers presented together with 32 short papers and 10 demonstrations papers were carefully reviewed and selected from 240 submissions. The papers are organized around the following topics: spatial data processing and data quality; graph data processing; data mining, privacy and semantic analysis; text and log data management; social networks; data mining and data streams; query processing; topic modeling; machine learning; recommendation systems; distributed data processing and applications; machine learning and optimization.

Web and Big Data - First International Joint Conference, APWeb-WAIM 2017, Beijing, China, July 7-9, 2017, Proceedings, Part II... Web and Big Data - First International Joint Conference, APWeb-WAIM 2017, Beijing, China, July 7-9, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Lei Chen, Christian S. Jensen, Cyrus Shahabi, Xiaochun Yang, Xiang Lian
R2,519 Discovery Miles 25 190 Ships in 10 - 15 working days

This two -volume set, LNCS 10366 and 10367, constitutes the thoroughly refereed proceedings of the First International Joint Conference, APWeb-WAIM 2017, held in Beijing, China in July 2017. The 44 full papers presented together with 32 short papers and 10 demonstrations papers were carefully reviewed and selected from 240 submissions. The papers are organized around the following topics: spatial data processing and data quality; graph data processing; data mining, privacy and semantic analysis; text and log data management; social networks; data mining and data streams; query processing; topic modeling; machine learning; recommendation systems; distributed data processing and applications; machine learning and optimization.

Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings... Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings (Paperback, 1st ed. 2016)
Xinyi Huang, Yang Xiang, Kuan-Ching Li
R2,370 Discovery Miles 23 700 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Grid and Pervasive Computing, GPC 2016, held in Seoul, Korea, in May 2016. The 20 revised papers were carefully reviewed and selected from 94 submissions. The conference contains various aspects including green computing, cloud computing, virtualisation, data and storage, and network security.

China Duel - A True Story of the Failed Coup in 2012 that Almost Avoided the Tyranny of the Xi Jingping Dictatorship... China Duel - A True Story of the Failed Coup in 2012 that Almost Avoided the Tyranny of the Xi Jingping Dictatorship (Paperback)
Yang Xiang
R516 R439 Discovery Miles 4 390 Save R77 (15%) Ships in 10 - 15 working days
Linear Systems - Non-Fragile Control and Filtering (Hardcover): Guang-Hong Yang, Xiang-Gui Guo, Wei-Wei Che, Wei Guan Linear Systems - Non-Fragile Control and Filtering (Hardcover)
Guang-Hong Yang, Xiang-Gui Guo, Wei-Wei Che, Wei Guan
R5,567 Discovery Miles 55 670 Ships in 12 - 17 working days

Linear Systems: Non-Fragile Control and Filtering presents the latest research results and a systematic approach to designing non-fragile controllers and filters for linear systems. The authors combine the algebraic Riccati technique, the linear matrix inequality (LMI) technique, and the sensitivity analysis method to establish a set of new non-fragile (insensitive) control methods. This proposed method can optimize the closed-loop system performance and make the designed controllers or filters tolerant of coefficient variations in controller or filter gain matrices. A Systematic Approach to Designing Non-Fragile Controllers and Filters for Linear Systems The text begins with developments and main research methods in non-fragile control. It then systematically presents novel methods for non-fragile control and filtering of linear systems with respect to additive/multiplicative controller/filter gain uncertainties. The book introduces the algebraic Riccati equation technique to solve additive/multiplicative norm-bounded controller/filter gain uncertainty, and proposes a structured vertex separator to deal with the numerical problem resulting from interval-bounded coefficient variations. It also explains how to design insensitive controllers and filters in the framework of coefficient sensitivity theory. Throughout, the book includes numerical examples to demonstrate the effectiveness of the proposed design methods. More Effective Design Methods for Non-Fragile Controllers and Filters The design and analysis tools described will help readers to better understand and analyze parameter uncertainties and to design more effective non-fragile controllers and filters. Providing a coherent approach, this book is a valuable reference for researchers, graduate students, and anyone who wants to explore the area of non-fragile control and filtering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lucky Lubricating Clipper Oil (100ml)
R49 R9 Discovery Miles 90
Luca Distressed Peak Cap (Khaki)
R249 Discovery Miles 2 490
Kiddylicious Cheese Straws (12g)
 (2)
R28 R25 Discovery Miles 250
Tower Self-Adhesive Sign - No Dogs…
R80 R61 Discovery Miles 610
Salton 3 Bar Heater
R613 Discovery Miles 6 130
Samsung EO-IA500BBEGWW Wired In-ear…
R299 R249 Discovery Miles 2 490
Minions 2 - The Rise Of Gru
Blu-ray disc R150 Discovery Miles 1 500
Parker Jotter Duo Ballpoint & Fountain…
 (2)
R699 R555 Discovery Miles 5 550
Sylvanian Families - Walnut Squirrel…
R749 R579 Discovery Miles 5 790
Russell Hobbs Toaster (2 Slice…
R707 Discovery Miles 7 070

 

Partners