You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the 6th International ICST Conference, TridentCom 2010, held in Berlin, Germany, in May 2010. Out of more than 100 submitted contributions the Program Committee finally selected 15 full papers, 26 practices papers, and 22 posters. They focus on topics as Internet testbeds, future Internet research, wireless sensors, media and mobility, and monitoring in large scale testbeds.
Internet of Things and the Law: Legal Strategies for Consumer-Centric Smart Technologies is the most comprehensive and up-to-date analysis of the legal issues in the Internet of Things (IoT). For decades, the decreasing importance of tangible wealth and power – and the increasing significance of their disembodied counterparts – has been the subject of much legal research. For some time now, legal scholars have grappled with how laws drafted for tangible property and predigital ‘offline’ technologies can cope with dematerialisation, digitalisation, and the internet. As dematerialisation continues, this book aims to illuminate the opposite movement: rematerialisation, namely, the retur...
The book provides a dynamic, cross-sectional, multidisciplinary perspective and dialogue to illuminate the challenges humans face in their interactions with data in their individual postdigital contexts in local communities. It offers unique insights from real cases, collaborations, and projects to extend existing academic theories and frameworks, applied to human data interactions, disadvantage, and digital skills. The book takes the novel approach of establishing co-authorship between cross-sector practitioners from the wider community (such as local authorities, councils, policy makers, small businesses, charities, education and skills providers, and other stakeholders) with international...
This year, the IFIP Working Conference on Distributed and Parallel Embedded Sys tems (DIPES 2008) is held as part of the IFIP World Computer Congress, held in Milan on September 7 10, 2008. The embedded systems world has a great deal of experience with parallel and distributed computing. Many embedded computing systems require the high performance that can be delivered by parallel computing. Parallel and distributed computing are often the only ways to deliver adequate real time performance at low power levels. This year’s conference attracted 30 submissions, of which 21 were accepted. Prof. Jor ̈ g Henkel of the University of Karlsruhe graciously contributed a keynote address on embedded...
This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the potential threats and risks arising from its complex architecture. The authors discuss the overall IoT architecture, covering networking, computing, and security threats and risks to hardware such as sensors, actuators, and portable devices, as well as infrastructure layers. They cover a range of technical concepts such as cryptography, distributed storage, and data transmission, and offer practical advice on implementing security solutions such as authentication and access control. By exploring the future of cybersecurity in the IoT industry, with insights into the importance of big data and the threats posed by data mining techniques, this book is an essential resource for anyone interested in, or working in, the rapidly evolving field of IoT security.
This volume presents the proceedings of the 6th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness and of the Third International ICST Workshop on Advanced Architectures and Algorithms for Internet DElivery and Applications. Both events were held in Las Palmas de Gran Canaria in November 2009. To each of these events is devoted a specific part of the volume. The first part is dedicated to the proceedings of ICST QShine 2009. The first four chapters deal with new issues concerning the quality of service in IP-based telephony and multimedia. A second set of four chapters addresses some important research problems in mul- hop wireless net...
This volume constitutes the first of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 59 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on distributed and parallel systems and algorithms; DSP, image processing, pattern recognition, and multimedia; software engineering; database and data Mining; as well as soft computing, such as AI, neural networks, fuzzy systems, etc.
A comprehensive review to the theory, application and research of machine learning for future wireless communications In one single volume, Machine Learning for Future Wireless Communications provides a comprehensive and highly accessible treatment to the theory, applications and current research developments to the technology aspects related to machine learning for wireless communications and networks. The technology development of machine learning for wireless communications has grown explosively and is one of the biggest trends in related academic, research and industry communities. Deep neural networks-based machine learning technology is a promising tool to attack the big challenge in w...
This book constitutes the proceedings of the 6th International Workshop on Traffic Monitoring and Analysis, TMA 2014, held in London, UK, in April 2014. The thoroughly refereed 11 full papers presented in this volume were carefully reviewed and selected from 30 submissions. The contributions are organized in topical sections on tools and lessons learned from passive measurement, performance at the edge and Web, content and inter domain.
This book constitutes the proceedings of the 18th International Conference on Passive and Active Measurement, PAM 2017, held in Sydney, Australia, in March 2017. The 20 full papers presented in this volume were carefully reviewed and selected from 87 submissions. They are organized in topical sections on IPv6, Web and applications, security, performance, latency, characterization and troubleshooting, and wireless.