You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
'A beautiful, deliberate and satisfying story spanning thirty years of Korean history' Publishers' Weekly 'Kim weaves a wonderfully nuanced historical portrait, rich in detail and resonant with meaning and wisdom' Independent In Korea, Najin Han, the privileged daughter of a calligrapher, longs to choose her own destiny. Smart and headstrong, she is encouraged by her mother - but her stern father is determined to maintain tradition, especially as the Japanese steadily gain control of his beloved country. When he seeks to marry fourteen-year-old Najin into an aristocratic family, her mother defies generations of obedient wives and instead sends her daughter to serve in the king's court as a c...
This book constitutes the refereed proceedings of the Second International Conference on High Performance Computing and Communications, HPCC 2006. The book presents 95 revised full papers, addressing all current issues of parallel and distributed systems and high performance computing and communication. Coverage includes networking protocols, routing, and algorithms, languages and compilers for HPC, parallel and distributed architectures and algorithms, wireless, mobile and pervasive computing, Web services, peer-to-peer computing, and more.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security Practice and Experience, ISPEC 2022, held in Taipei, Taiwan, in November 2022. The 33 full papers together with 2 invited papers included in this volume were carefully reviewed and selected from 87 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
The three volume set LNAI 4251, LNAI 4252, and LNAI 4253 constitutes the refereed proceedings of the 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2006, held in Bournemouth, UK in October 2006. The 480 revised papers presented were carefully reviewed and selected from about 1400 submissions. The papers present a wealth of original research results from the field of intelligent information processing.
Here are the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing in Seoul, Korea, August 2006. The book presents 102 revised papers spanning six workshops: network-centric ubiquitous systems (NCUS 2006), security in ubiquitous computing systems (SecUbiq 2006), RFID and ubiquitous sensor networks (USN 2006), trustworthiness, reliability and services in ubiquitous and sensor networks (TRUST 2006), embedded software optimization (ESO 2006), and multimedia solution and assurance in ubiquitous information systems (MSA 2006).
This book highlights the latest research findings, methods and techniques, as well as challenges and solutions related to Ubiquitous and Pervasive Computing (UPC). In this regard, it employs both theoretical and practical perspectives, and places special emphasis on innovative, mobile and internet services. With the proliferation of wireless technologies and electronic devices, there is a rapidly growing interest in Ubiquitous and Pervasive Computing (UPC). UPC makes it possible to create a human-oriented computing environment in which computer chips are embedded in everyday objects and interact with the physical world. Through UPC, people can remain online even while underway, thus enjoying nearly permanent access to their preferred services. Though it has a great potential to revolutionize our lives, UPC also poses a number of new research challenges.
This book constitutes the refereed joint proceedings of seven international workshops held in conjunction with the 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007, held in Niagara Falls, Canada in August 2007. The 53 revised full papers presented were carefully selected from many high quality submissions. The workshops contribute to enlarging the spectrum of the more general topics treated in the ISPA 2007 main conference.
This book constitutes the refereed proceedings of the Second International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, ISDDC 2018, held in Vancouver, BC, Canada, in November 2018. The 10 full papers were carefully reviewed and selected from 28 submissions. This book also contains the abstracts of two keynote talks and one tutorial. The contributions included in this proceedings cover many aspects of theory and application of effective and efficient paradigms, approaches, and tools for building, maintaining, and managing secure and dependable systems and infrastructures, such as botnet detection, secure cloud computing and cryptosystems, IoT security, sensor and social network security, behavioral systems and data science, and mobile computing.
This book constitutes the refereed proceedings of the 2nd EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019, held in Tianjin, China, in April 2019. The 62 full papers were selected from 112 submissions and are grouped into topics on privacy and security analysis, Internet of Things and cloud computing, system building, scheme, model and application for data, mechanism and method in new computing.
This book features selected papers from the 9th International Conference on Mathematics and Computing (ICMC 2023), organized at BITS Pilani K. K. Birla Goa Campus, India, during 6–8 January 2023. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry in mathematics, statistics, cryptography, network security, cybersecurity, machine learning, data analytics, and blockchain technology in computer science and information technology.