You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2017, held in Edinburgh, UK, in December 2017. The 65 papers presented were carefully reviewed and selected from 103 submissions and focus on electronic collaboration between distributed teams of humans, computer applications, and autonomous robots to achieve higher productivity and produce joint products.
This book presents state-of-the-art research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered many themes, including artificial intelligence and blockchain challenges, models and applications, cyber threats and intrusions analysis and detection, and many other applications for smart cyber ecosystems. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on artificial intelligence and blockchain for future cybersecurity applications.
Consumers want it, businesses are demanding it. The migration of Internet services to a mobile environment is inevitable. But while the ability to be on the go and connected to the Internet sets the stage for increased efficiency and productivity, many technical challenges associated with user mobility and wireless connectivity remain. Mobil
This book constitutes the thoroughly refereed post-proceedings of the International Conference on Information Networking, ICOIN 2006 held in Sendai, Japan in January 2006. The 98 revised full papers presented were carefully selected and improved during two rounds of reviewing and revision from a total of 468 submissions.
This two-volume set constitutes the refereed proceedings of the 17th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2021, held in October 2021. Due to COVID-19 pandemic the conference was held virtually. The 62 full papers and 7 short papers presented were carefully reviewed and selected from 206 submissions. The papers reflect the conference sessions as follows: Optimization for Collaborate System; Optimization based on Collaborative Computing; UVA and Traffic system; Recommendation System; Recommendation System & Network and Security; Network and Security; Network and Security & IoT and Social Networks; IoT and Social Networks & Images handling and human recognition; Images handling and human recognition & Edge Computing; Edge Computing; Edge Computing & Collaborative working; Collaborative working & Deep Learning and application; Deep Learning and application; Deep Learning and application; Deep Learning and application & UVA.
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
This book constitutes the refereed proceedings of the 16th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2016, held in Granada, Spain, in December 2016. The 30 full papers and 22 short papers presented were carefully reviewed and selected from 117 submissions. They cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems trying to push beyond the limits of existing technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing parallel processing technology.
Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy in Smart Sensor Networks is a critical scholarly resource that examines recent developments and emerging trends in smart sensor security and privacy by providing new models, practical solutions, and technological advances related to security. Featuring coverage on a broad range of topics such as cloud security, encryption, and intrusion detection systems, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on authentication and intrusion detection.
This book constitutes the proceedings of the 26th European Conference on Advances in Databases and Information Systems, ADBIS 2022, held in Turin, Italy, in September 2022. The 29 short papers presented were carefully reviewed and selected from 90 submissions. The selected short papers are organized in the following sections: data understanding, modeling and visualization; fairness in data processing; data management pipeline, information and process retrieval; data access optimization; data pre-processing and cleaning; data science and machine learning. Further, papers from the following workshops and satellite events are provided in the volume: DOING: 3rd Workshop on Intelligent Data – From Data to Knowledge; K-GALS: 1st Workshop on Knowledge Graphs Analysis on a Large Scale; MADEISD: 4th Workshop on Modern Approaches in Data Engineering and Information System Design; MegaData: 2nd Workshop on Advanced Data Systems Management, Engineering, and Analytics; SWODCH: 2nd Workshop on Semantic Web and Ontology Design for Cultural Heritage; Doctoral Consortium.