You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed post-conference proceedings of the 11th EAI International Conference on Research in Computer science and its Applications, CNRIA 2021, held in June 2021. Due to COVID-19 pandemic the conference was held virtually. The 11 full papers presented were selected from 24 submissions and issue different problems in underserved and unserved areas. The papers are arranged in 3 tracks: data science and artificial intelligence; telecom and artificial intelligence; IoT and ICT applications.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Pan-African Intelligence and Smart Systems, PAAISS 2022, which was held in Dakar, Senegal, in November 2022. The 27 revised full papers presented were carefully selected from 70 submissions. The theme of PAAISS 2022 was: IoT and Enabling Smart System Technologies, Special Topics of African Interest, Artificial Intelligence Theory and Methods, Artificial Intelligence Applications in Medicine, Remote sensing and AI in Agriculture, AI applications and Smart Systems technologies, Affective Computing, Intelligent Transportation systems.
This book constitutes the refereed proceedings of the First International Conference on Decision and Game Theory for Security, GameSec 2010, held in Berlin, Germany, in November 2010. The 12 revised full papers and 6 revised short papers presented were carefully reviewed and selected from numerous submissions and focus on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. The papers are organized in topical sections on security investments and planning, privacy and anonymity, adversarial and robust control, network security and botnets, authorization and authentication, as well as theory and algorithms for security.
This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for Security, GameSec 2013, held in Fort Worth, TX, USA, in November 2013. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. The conference focuses on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. At the same time, the connection between theoretical models and real world security problems are emphasized to establish the important feedback loop between theory and practice. Observing the scarcity of venues for researchers who try to develop a deeper theoretical understanding of the underlying incentive and resource allocation issues in security, we believe that GameSec will fill an important void and serve as a distinguished forum of highest standards for years to come.
This book primarily focuses on the African Sahel region, shedding new light on the epidemiology, socio-economics, clinical manifestations and control approaches of transboundary animal diseases (TADs) in this specific region. In addition to the description of TADs in Sahelian Africa and connected regions, several issues regarding the burden of TADs, the role of national/regional/international veterinary organizations in the surveillance process, animal mobility, one health and TADs in the dromedary are discussed. The book contains 22 chapters and is structured in three parts, i- general features and commonalities, ii- viral diseases, iii- bacterial diseases. Each chapter was written by a group of experts specialized in the topic. This work will be of general interest to researchers, veterinarians, veterinary public health officers, and students engaged in the surveillance and control of animal infectious diseases, included those of zoonotic nature and that are prevalent in the Sahel.
This book results from many years of teaching an upper division course on communication networks in the EECS department at the University of California, Berkeley. It is motivated by the perceived need for an easily accessible textbook that puts emphasis on the core concepts behind current and next generation networks. After an overview of how today's Internet works and a discussion of the main principles behind its architecture, we discuss the key ideas behind Ethernet, WiFi networks, routing, internetworking, and TCP. To make the book as self-contained as possible, brief discussions of probability and Markov chain concepts are included in the appendices. This is followed by a brief discussi...
This book is written for computer engineers and scientists active in the development of software and hardware systems. It supplies the understanding and tools needed to effectively evaluate the performance of individual computer and communication systems. It covers the theoretical foundations of the field as
This book gathers papers on interactive and collaborative mobile learning environments, assessment, evaluation and research methods in mobile learning, mobile learning models, theory and pedagogy, open and distance mobile learning, life-long and informal learning using mobile devices, wearables and the Internet of Things, game-based learning, dynamic learning experiences, mobile systems and services for opening up education, mobile healthcare and training, case studies on mobile learning, and 5G network infrastructure. Today, interactive mobile technologies have become the core of many—if not all—fields of society. Not only do the younger generation of students expect a mobile working an...
This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.
This book constitutes the refereed proceedings of the Third International Conference on Trust and Trustworthy Computing, TRUST 2010, held in Berlin, Germany, in June 2010. The 25 revised full papers and 6 short papers presented were carefully selected from numerous submissions. The papers are organized in a technical strand and a socio-economic strand and cover a broad range of concepts including trustworthy infrastructures, services, hardware, software, and protocols as well as social and economic aspects of the design, application, and usage of trusted computing.