You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the post proceedings of the 18th International Workshop on Security and Trust Management, STM 2022, co-located with the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in Copenhagen, Denmark, in September 2022. The 7 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 18 submissions. The workshop presents papers with topics such as security and trust access control, cryptographic protocols, identity management, security metrics, and privacy.
This book covers the theory, design and applications of computer networks, distributed computing and information systems. Networks of today are going through a rapid evolution, and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low-power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications have...
This book gathers selected papers from the KES-IDT 2022 Conference, held in Rhodes, Greece on June 20–22, 2022. The book presents and discusses the latest research results and generates new ideas in the field of intelligent decision-making. The range of topics discussed are classification, prediction, data analysis, big data, data science, decision support, knowledge engineering, and modeling in diverse areas such as finance, cybersecurity, economics, health, management, and transportation. The problems in Industry 4.0 and IoT are also addressed. The book contains several sections devoted to specific topics, such as intelligent data processing and its applications, high-dimensional data analysis and its applications, multi-criteria decision analysis—theory and applications, large-scale systems for intelligent decision-making and knowledge engineering, decision technologies and related topics in big data analysis of social and financial issues, and decision-making theory for economics.
Invisible City analyzes conventual architecture in terms of the politics of sight, "the optics of power", the relationship between flesh and stone. It uncovers the connections between the bodies of the nuns and the walls that housed them, presenting the architecture of female convents as a metaphor for the body of the aristocratic female virgin nun.
This book constitutes the refereed proceedings of the 12th International Joint Conference on E-Business and Telecommunications, ICETE 2015, held in Colmar, France, in July 2015. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP. The 23 full papers presented together with an invited paper in this volume were carefully reviewed and selected from 218 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless information networks and systems.
This book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.
This book details cutting-edge research into human-like driving technology, utilising game theory to better suit a human and machine hybrid driving environment. Covering feature identification and modelling of human driving behaviours, the book explains how to design an algorithm for decision making and control of autonomous vehicles in complex scenarios. Beginning with a review of current research in the field, the book uses this as a springboard from which to present a new theory of human-like driving framework for autonomous vehicles. Chapters cover system models of decision making and control, driving safety, riding comfort and travel efficiency. Throughout the book, game theory is appli...