You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the revised selected papers of the Second International Conference on Networked Systems, NETYS 2014, held in Marrakech, Morocco, in May 2014. The 20 full papers and the 6 short papers presented together with 2 keynotes were carefully reviewed and selected from 80 submissions. They address major topics such as multi-core architectures; concurrent and distributed algorithms; middleware environments; storage clusters; social networks; peer-to-peer networks; sensor networks; wireless and mobile networks; as well as privacy and security measures to protect such networked systems and data from attack and abuse.
This book constitutes the refereed proceedings of the 9th International Conference on Principles and Practice of Constraint Programming, CP 2003, held in Kinsale, Ireland in September/October 2003. The 48 revised full papers and 34 revised short papers presented together with 4 invited papers and 40 abstracts of contributions to the CP 2003 doctoral program were carefully reviewed and selected from 181 submissions. A wealth of recent results in computing with constraints is addressed ranging from foundational and methodological issues to solving real-world problems in a variety of application fields.
This book constitutes the refereed proceedings of the 4th International Conference on Wired/Wireless Internet Communications, WWIC 2006, held in Bern, Switzerland, in May 2006. The book presents 29 revised full papers, organized in topical sessions on wireless networks, UMTS and OFDM, mobile ad-hoc networks, power saving and sensor networks, voice and video over wireless networks, mobility, TCP, signalling, charging, and security.
Introduction: Securing Cyber-Physical Infrastructures--An Overview Part 1: Theoretical Foundations of Security Chapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach Chapter 2: Game Theory for Infrastructure Security -- The Power of Intent-Based Adversary Models Chapter 3: An Analytical Framework for Cyber-Physical Networks Chapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and Application Part 2: Security for Wireless Mobile Networks Chapter 5: Mobile Wireless Network Security Chapter 6: Robust Wireless Infrastructure against Jamming Attacks Chapter 7: Security for Mobile Ad Hoc Networks Chapter 8: Defending against Identity-Based Attacks in Wireless Networks Part 3: Security for Sensor Networks Chapter 9: Efficient and Distributed Access Control for Sensor Networks Chapter 10: Defending against Physical Attacks in Wireless Sensor Networks Chapter 11: Node Compromise Detection in Wireless Sensor N ...
This book constitutes the refereed proceedings of the 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2012, held in Toronto, Canada, in October 2012. The 21 full papers and 10 brief announcements presented in this volume were carefully reviewed and selected from 75 submissions. The conference provides a wide spectrum of topics, covered in the following tracks: self-stabilization, ad-hoc and sensor networks, fault-tolerance and dependable systems, safety and security, cloud computing, formal methods, social networks, peer-to-peer, self-organizing and autonomic systems.
It has been recognized since the inception of Artificial Intelligence (AI) that abstractions, problem reformulations, and approximations (AR&A) are central to human common sense reasoning and problem solving and to the ability of systems to reason effectively in complex domains. AR&A techniques have been used to solve a variety of tasks, including automatic programming, constraint satisfaction, design, diagnosis, machine learning, search, planning, reasoning, game playing, scheduling, and theorem proving. The primary purpose of AR&A techniques in such settings is to overcome computational intractability. In addition, AR&A techniques are useful for accelerating learning and for summarizing se...
This book constitutes the thoroughly refereed conference proceedings of the 6th International Conference on Networked Systems, NETYS 2018, held in Essaouira, Morocco, in May 2018. The 22 full and 6 short papers presented together with 11 keynotes and 2 invited papers were carefully reviewed and selected from 85 submissions. They are organized in the following topics: distribution; concurrency; verification; networking; self-stabilization; security; graph; and middleware.
This book constitutes the revised selected papers of the Third International Conference on Networked Systems, NETYS 2015, held in Agadir, Morocco, in May 2015. The 29 full papers and 12 short papers presented together with 22 poster abstracts were carefully reviewed and selected from 133 submissions. They address major topics such as multi-core architectures; concurrent and distributed algorithms; middleware environments; storage clusters; social networks; peer-to-peer networks; sensor networks; wireless and mobile networks; and privacy and security measures.
This book constitutes the refereed proceedings of the Second International Conference on Wired/Wireless Internet Communications, WWIC 2004, held in Frankfurt/Oder, Germany, in February 2004. The 26 revised full papers presented were carefully reviewed and selected from around 60 submissions. The papers are organized in topical sections on protocol engineering and energy efficiency in wireless networks; mobility management and mobile devices; transport layer and congestion control; architecture, implementation, and experimentation; network and protocol modeling; wireless network scheduling and analysis; multimedia distribution and group communication; and service discovery.