You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.
Acoustics is a mature field which enjoys a never ending youth. New developments are induced by either the search for a better understanding, or by technological innovations. Micro-fabrication techniques introduced a whole new class of microdevices, which exploit acoustic waves for various tasks, and in particular for information processing and for sensing purposes. Performance improvements are achievable by better modelling tools, able to deal with more complex configurations, and by more refined techniques of fabrication and of integration in technological systems, like wireless communications. Several chapters of this book deal with modelling and fabrication techniques for microdevices, including unconventional phenomena and configurations. But this is far from exhausting the research lines in acoustics. Theoretical analyses and modelling techniques are presented, for phenomena ranging from the detection of cracks to the acoustics of the oceans. Measurement methods are also discussed, which probe by acoustic waves the properties of widely different systems.
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2015, held in Wuhan, China, in November 2015. The 24 full papers and 8 short papers presented were carefully reviewed and selected from numerous submissions. They address topics around networking, technology and systems, including but not limited to collaborative cloud computing, architecture and evaluation, collaborative applications, sensors and Internet of Things (IoT), security.
Selected, peer reviewed papers from the 2014 4th International Conference on Intelligent System and Applied Material (GSAM 2014), August 23-24, 2014, Taiyuan, China
This book constitutes the refereed proceedings of the International Conference on Artificial Intelligence and Computational Intelligence, AICI 2012, held in Chengdu, China, in October 2012. The 163 revised full papers presented were carefully reviewed and selected from 724 submissions. The papers are organized in topical sections on applications of artificial intelligence; applications of computational intelligence; data mining and knowledge discovering; evolution strategy; intelligent image processing; machine learning; neural networks; pattern recognition.
This two-volume set LNICST 396 and 397 constitutes the post-conference proceedings of the Third EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 79 full papers were carefully reviewed and selected from 159 submissions. The papers are organized in topical sections on Artificial Intelligence in Wireless Communications and Satellite Communications; Artificial Intelligence in Electromagnetic Signal Processing; Artificial Intelligence Application in Wireless Caching and Computing; Artificial Intelligence Application in Computer Network.
This book frames the contentious political disputes surrounding Taiwan within the perspective of neorealist political theory. Analyzing the motives and relative importance that the actors involved bring to bear, Dr. Sang offers a timely intervention and a much-needed reality check on the role that Taiwan plays in structuring US-China-Japan trilateral relations—an issue that will dominate the years to come. This book will be of value to scholars, policymakers, and all those concerned with the future of Taiwan.
This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015. The 28 full papers were carefully reviewed and selected from 119 submissions. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security problems, solutions, and technologies related to intrusion detection, attacks, and defenses.