You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the First International Symposium on Agent and Multi-Agent Systems: Technologies and Applications, KES-AMSTA 2007, held in Wroclaw, Poland in May/June 2007. Coverage includes agent-oriented Web applications, mobility aspects of agent systems, agents for network management, agent approaches to robotic systems, as well as intelligent and secure agents for digital content management.
This book constitutes selected papers from the 23rd International Conference on Information Security and Cryptology, ICISC 2020, held in Seoul, South Korea, in December 2020. Due to the COVID-19, the confere was held online. The total of 15 papers presented in this volume were carefully reviewed and selected from 51 submissions. The aim of this conference was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptology.
Developments in the use of game theory have impacted multiple fields and created opportunities for new applications. With the ubiquity of these developments, there is an increase in the overall utilization of this approach. Game Theory: Breakthroughs in Research and Practice contains a compendium of the latest academic material on the usage, strategies, and applications for implementing game theory across a variety of industries and fields. Including innovative studies on economics, military strategy, and political science, this multi-volume book is an ideal source for professionals, practitioners, graduate students, academics, and researchers interested in the applications of game theory.
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
The First International Symposium on Combinatorics, Algorithms, Probabilistic and Experimental Methodologies was held in Hangzhou, China, in April 2007. The symposium provided an interdisciplinary forum for researchers to share their discoveries and approaches; search for ideas, methodologies, and tool boxes; find better, faster, and more accurate solutions; and develop a research agenda of common interest. This volume constitutes the refereed post-proceedings of the symposium. Inside you'll find 46 full papers. They represent some of the most important thinking and advancements in the field. The papers address large data processing problems using different methodologies from major disciplines such as computer science, combinatorics, and statistics.
This book constitutes the refereed proceedings of the Second International Conference on High Performance Computing and Communications, HPCC 2006. The book presents 95 revised full papers, addressing all current issues of parallel and distributed systems and high performance computing and communication. Coverage includes networking protocols, routing, and algorithms, languages and compilers for HPC, parallel and distributed architectures and algorithms, wireless, mobile and pervasive computing, Web services, peer-to-peer computing, and more.
The current data engineering demands more than theoretical understanding; it necessitates a practical, nuanced approach. Data engineering involves the intricate orchestration of systems and architectural frameworks for collecting, storing, processing, and analyzing vast datasets. The challenge lies in ensuring this data is managed and harnessed effectively, fostering insightful knowledge and steering organizations toward data-driven decision-making. Critical Approaches to Data Engineering Systems and Analysis unveils the latent potential inherent in diverse data analysis and engineering techniques. It combines compelling perspectives, guidelines, and frameworks, applying statistical and mathematical models. As industries and research communities witness increasing demand for web-based systems, software modules, heuristic models, and survey analysis, the book emphasizes the critical methodologies associated with data verification, reliability, fault tolerance, and viability.
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.
This volume highlights the latest advances, innovations, and applications in the field of fibre reinforced concrete (FRC) and discusses a diverse range of topics concerning FRC: rheology and early-age properties, mechanical properties, codes and standards, long-term properties, durability, analytical and numerical models, quality control, structural and Industrial applications, smart FRC’s, nanotechnologies related to FRC, textile reinforced concrete, structural design and UHPFRC. The contributions present improved traditional and new ideas that will open novel research directions and foster multidisciplinary collaboration between different specialists. Although the symposium was postponed, the book gathers peer-reviewed papers selected in 2020 for the RILEM-fib International Symposium on Fibre Reinforced Concrete (BEFIB).