You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Part of a four-volume set, this book constitutes the refereed proceedings of the 7th International Conference on Computational Science, ICCS 2007, held in Beijing, China in May 2007. The papers cover a large volume of topics in computational science and related areas, from multiscale physics to wireless networks, and from graph theory to tools for program development.
The book constitutes the refereed proceedings of the Second International Conference on Distributed Computing in Sensor Systems, DCOSS 2006, held in San Francisco, California, USA in June 2006. The 33 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers focus on distributed computing issues in large-scale networked sensor systems, including systematic design techniques and tools; they cover topics such as distributed algorithms and applications, programming support and middleware, data aggregation and dissemination, security, information fusion, lifetime maximization, and localization.
This book constitutes the refereed proceedings of the Third International Conference on Embedded Software, EMSOFT 2003, held in Philadelphia, PA, USA in October 2003. The 20 revised full papers presented together with three invited papers were carefully reviewed and selected from 60 submissions. All current topics in embedded software are addressed: formal methods and model-based development, middleware and fault tolerance, modelling and analysis, programming languages and compilers, real-time scheduling, resource-aware systems, and systems on a chip.
The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi’an, China, in September 2017. The total of 112 contributions presented in these volumes are carefully reviewed and selected from 178 submissions. Aside from the technical paper sessions the book is organized in topical sections on wireless communications and networking, satellite and space communications and networking, big data network track, multimedia communications and smart networking, signal processing and communications, network and information security, advances and trends of V2X networks.
The provision of IP-based multimedia services is one of the most exiting and challenging aspects of next generation wireless networks. A significant evolution has been underway for enabling such multimedia services and for ultimately migrating the Internet to the wireless world. This book examines this evolution, looking at an array of the most up-to-date wireless multimedia technologies and services. The first part focuses on enabling technologies for wireless multimedia, while the second is dedicated to the new wireless multimedia services that are expected to play a key role in the future wireless environment. In addition, the related recent standardization, research and industry activiti...
This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2012, held in Yellow Mountains, China, in August 2012. The 24 revised full papers presented together with 32 invited papers were carefully reviewed and selected from 116 submissions. The papers cover a wide range of topics such as cognitive radio networks, cyber-physical network systems, mobile handset networking systems, underwater and radar wireless networks, and wireless and mobile security.
This book constitutes the refereed proceedings of the 5th Annual International Conference on Wireless Algorithms, Systems, and Applications, WASA 2010, held in Beijing, China, in August 2010. The 19 revised full papers and 10 revised short papers presented together with 18 papers from 4 workshops were carefully reviewed and selected from numerous submissions. The papers are organized in topica sections on topology control and coverage, theoretical foundations, energy-aware algorithms and protocol design, wireless sensor networks and applications, applications and experimentation, scheduling and channel assignment, coding, information theory and security, security of wireless and ad-hoc networks, data management and network control in wireless networks, radar and sonar sensor networks, as well as compressive sensing for communications and networking.
Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector. Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics.
This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.