You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. ...
CEAs (cost-effectiveness analyses) are used by decision makers in the health sector to make enlightened evaluations and this book provides an in depth look at how to evaluate the evaluator. The book is aimed specifically at Public health specialists.
Major (Dr) Tapas Kumar Aich has written many scientific, research, and review articles in his long academic carrier as a specialist/teacher in the field of Psychiatry. The present book is a collection of brief write-ups which were posted intermittently on a social media platform. Target readers for the present book are common people who have some interest in topics related to psychiatry, psychology, medicine, arts, and philosophy. For the benefit of the readers, the book is divided into five chapters: creativity and mental health, a collection of random thoughts, brief essays on various topics on schizophrenia, different shades in the clinical presentation of depression and a collection of clinical vignettes in various neuro-psychiatric illnesses. A special feature of this book is the collection of comments/discussion posted by the author’s social media friends, in many of the write-ups. Major (Dr) Aich hopes that the students and people from various strata of life, irrespective of their profession and position, will accept the book whole-heartedly.
This book constitutes the refereed proceedings of the 6th IFIP WG 11.11 International Conference, IFIPTM 2012, held in Surat, India, in May 2012. The 12 revised full papers presented together with 8 short papers and the abstracts of 4 keynote talks were carefully reviewed and selected from 51 submissions. Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary conference focusing on areas such as: trust models, social, economic and behavioural aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.
This book constitutes the refereed proceedings of the 52nd Annual Convention of the Computer Society of India, CSI 2017, held in Kolkata, India, in January 2018. The 59 revised papers presented were carefully reviewed and selected from 157 submissions. The theme of CSI 2017, Social Transformation – Digital Way, was selected to highlight the importance of technology for both central and state governments at their respective levels to achieve doorstep connectivity with its citizens. The papers are organized in the following topical sections: Signal processing, microwave and communication engineering; circuits and systems; data science and data analytics; bio computing; social computing; mobile, nano, quantum computing; data mining; security and forensics; digital image processing; and computational intelligence.
This book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013, held in Malaga, Spain, in June 2013. The 14 revised full papers and 9 short papers presented were carefully reviewed and selected from 62 submissions. The papers cover a wide range of topics focusing on multi-disciplinary areas such as: trust models, social foundations of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.
This book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2014, held in Singapore, in July 2014. The 12 revised full papers and 5 short papers presented were carefully reviewed and selected from 36 submissions. In addition, the book contains one invited paper. The papers cover a wide range of topics focusing on the following main areas: trust and reputation models; privacy issues and social and behavioral models of trust; the relationship between trust and security; trust under attacks and trust in the cloud environment.
Modern computer networks or wireless ad-hoc networks offer a wide range of interesting optimization problems. Usual optimization goals are the minimization of the message delay in a Peer-to-Peer system or the minimization of the energy consumption of a wireless network. This thesis presents different kinds of algorithms to solve such optimization problems. Starting from the mathematical formulations for these problems, various global view optimization algorithms are presented. These algorithms are based on evolutionary algorithms and local search or similar heuristics. They can be used to quickly find near-optimal solutions, if a global view of the network is possible. As the participants in a computer network or a wireless ad-hoc network are autonomous nodes, distributed algorithms can be designed that enable these nodes to collectively solve the optimization problem. Four distributed algorithms are formulated and evaluated in this thesis, thus laying grounds for distributed optimization of networks. Using these algorithms, the network can be modelled as a self-optimizing network and the optimization problem can be approached without global view.
Decision making is a key activity, perhaps the most important activity, in the practice of healthcare. Although physicians acquire a great deal of knowledge and specialised skills during their training and through their practice, it is in the exercise of clinical judgement and its application to individual patients that the outstanding physician is distinguished. This has become even more relevant as patients become increasingly welcomed as partners in a shared decision making process. This book translates the research and theory from the science of decision making into clinically useful tools and principles that can be applied by clinicians in the field. It considers issues of patient goals, uncertainty, judgement, choice, development of new information, and family and social concerns in healthcare. It helps to demystify decision theory by emphasizing concepts and clinical cases over mathematics and computation.
This book presents selected proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. They cover diverse topics ranging from communications networks to big data analytics, and from system architecture to cyber security. This book focuses on Software Engineering, and informs readers about the state of the art in software engineering by gathering high-quality papers that represent the outcomes of consolidated research and innovations in Software Engineering and related areas. In addition to helping practitioners and researchers understand the chief issues involved in designing, developing, evolving and validating complex software systems, it provides comprehensive information on developing professional careers in Software Engineering. It also provides insights into various research issues such as software reliability, verification and validation, security and extensibility, as well as the latest concepts like component-based development, software process models, process-driven systems and human-computer collaborative systems.