You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The increasing diversity of Infonnation Communication Technologies and their equally diverse range of uses in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. Each communication exchange contains an identifier which may, or may not, be intended by the parties involved. What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked infonnation society? th th From the 6 to the 10 August 2007, IFIP (International Federation for Infonnation Processing) working groups 9. 2 (Social Accountability), 9. 6/11. 7 (IT rd Misuse and the Law) and 11. 6 (Identity Management) hold the...
The first International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services (IDMS) was organized by Prof. K. Rothermel and Prof. W. Effelsberg, and took place in Stuttgart in 1992. It had the form of a national forum for discussion on multimedia issues related to communications. The succeeding event was "attached" as a workshop to the German Computer Science Conference (GI Jahrestagung) in 1994 in Hamburg, organized by Prof. W. Lamersdorf. The chairs of the third IDMS, E. Moeller and B. Butscher, enhanced the event to become a very successful international meeting in Berlin in March 1996. This short overview on the first three IDMS events is taken from the p...
Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. Information security in the business setting has matured in the last few decades. Standards such as IS017799, the Common Criteria (ISO15408), and a number of industry certifications and risk analysis methodologies have raised the bar for good security solutions from a business perspective. Designed for a professional audience composed of researchers and practitioners in industry, Quality of Protection: Security Measurements and Metrics is also suitable for advanced-level students in computer science.
The uses of multimedia are rapidly increasing. Its power to present information in ways not previously possible and its integration of resources, allow for the creation of rich learning environments. Perspectives on Multimedia: Communication, Media and Information Technology provides a critical examination of the latest multimedia developments and approaches, such as Interface Technology and QoS architectures. Topics covered include: The key concepts intrinsic to digital forms of multimedia: integration, interactivity, hypermedia, immersion, narrativity and hybridity. The development of Information Technology (IT) usage in society and in the business community. How modern IT enables private ...
This book constitutes the proceedings of the 23rd International Conference on Passive and Active Measurement, PAM 2022, held in March 2022. Due to COVID-19 pandemic, the conference was held virtually. The 15 full papers and 15 short papers presented in this volume were carefully reviewed and selected from 62 submissions. The papers present emerging and early-stage research in network measurements – work that seeks to better understand complex, real-world networked systems and offer critical empirical foundations and support to network research.
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Cloud Computing and Services Science, CLOSER 2012, held in Porto, Portugal, in April 2012. The 15 papers were selected from 145 submissions and are presented together with one invited paper. The papers cover the following topics: cloud computing fundamentals, services science foundation for cloud computing, cloud computing platforms and applications, and cloud computing enabling technology.
The International Conference on Networking (ICN 2005) was the fourth conf- ence in its series aimed at stimulating technical exchange in the emerging and important ?eld of networking. On behalf of the International Advisory C- mittee, it is our great pleasure to welcome you to the proceedings of the 2005 event. Networking faces dramatic changes due to the customer-centric view, the venue of the next generation networks paradigm, the push from ubiquitous n- working,andthenewservicemodels.Despitelegacyproblems,whichresearchers and industry are still discovering and improving the state of the art, the ho- zon has revealed new challenges that some of the authors tackled through their submissions...
Welcome to IWQoS2001 in Karlsruhe! Quality of Service is a very active research field, especially in the networking community. Research in this area has been going on for some time, with results getting into development and finally reaching the stage of products. Trends in research as well as a reality check will be the purpose of this Ninth InternationalW orkshopo n Quality of Service. IWQoS isa ver y successful seriesof workshops and has established itself as one of the premier forums for the presentation and discussion of new research and ideas on QoS. The importance of this workshop series is also reflected in the large number of excellents ubmissions. Nearly 150 papers from all continents were submitted to the workshop, about a fifth of these being short papers. The program committee were very pleased witht he quality of the submissions andh ad the difficult task of selecting the relatively small number of papers which could be accepted for IWQoS2001. Due to the tough competition, many very good papers had to be rejected.
The relevance of the Internet has dramatically grown in the past decades. However, the enormous financial impact attracts many types of criminals. Setting up proper security mechanisms (e.g., Intrusion Detection Systems (IDS)) has therefore never been more important than today. To further compete with today's data transfer rates (10 to 100 Gbit/s), dedicated hardware accelerators have been proposed to offload compute intensive tasks from general purpose processors. As one key technology, reconfigurable hardware architectures, e.g., the Field Programmable Gate Array (FPGA), are of particular interest to this end. This work addresses the use of such FPGAs in the context of interactive communic...