You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book provides a quick reference and insights into modeling and optimization of software-defined networks (SDNs). It covers various algorithms and approaches that have been developed for optimizations related to the control plane, the considerable research related to data plane optimization, and topics that have significant potential for research and advances to the state-of-the-art in SDN. Over the past ten years, network programmability has transitioned from research concepts to more mainstream technology through the advent of technologies amenable to programmability such as service chaining, virtual network functions, and programmability of the data plane. However, the rapid developme...
Networks naturally appear in many high-impact domains, ranging from social network analysis to disease dissemination studies to infrastructure system design. Within network studies, network connectivity plays an important role in a myriad of applications. The diversity of application areas has spurred numerous connectivity measures, each designed for some specific tasks. Depending on the complexity of connectivity measures, the computational cost of calculating the connectivity score can vary significantly. Moreover, the complexity of the connectivity would predominantly affect the hardness of connectivity optimization, which is a fundamental problem for network connectivity studies. This bo...
This book provides a quick reference and insights into modeling and optimization of software-defined networks (SDNs). It covers various algorithms and approaches that have been developed for optimizations related to the control plane, the considerable research related to data plane optimization, and topics that have significant potential for research and advances to the state-of-the-art in SDN. Over the past ten years, network programmability has transitioned from research concepts to more mainstream technology through the advent of technologies amenable to programmability such as service chaining, virtual network functions, and programmability of the data plane. However, the rapid developme...
IoT for Defense and National Security Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses challenges in converting defense industrial operations to IoT and summarizes policy recommendations for regulating government use of IoT in free societies. As a modern reference, this book covers multiple technologies in IoT including survivable ta...
Scope: The classification of researchers and scientists in Greece in a unified list based on the citation impact and dissemination level of their scientific work according to Google Scholar database. Classification criteria: First criterion is h-index. In the case of equal h-index, the following scientometric indicators are used for the classification. The number of total citations, the i10-index, the total impact factor of scientist, the m-index or m-quotient of scientist. Information resource: The h-index, citations and i10-index derived from the public profiles of researchers in the Google Scholar database. In addition, the calculation of total impact factor and m-index of each researcher...
This book presents the best papers from the 4th International Conference on Mathematical Research for Blockchain Economy (MARBLE) 2023, held in London, UK. While most blockchain conferences and forums are dedicated to business applications, product development, or Initial Coin Offering (ICO) launches, this conference focused on the mathematics behind blockchain to bridge the gap between practice and theory. The book spans the divide between theoretical promise and practical reality in blockchain technology and explores the challenges hindering its real-world integration across diverse sectors, offering comprehensive insights into issues like scalability, security, and privacy.
An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces intr...
The Migration Conference 2017 hosted by Harokopio University, Athens from 23 to 26 August. The 5th conference in our series, the 2017 Conference was probably the largest scholarly gathering on migration with a global scope. Human mobility, border management, integration and security, diversity and minorities as well as spatial patterns, identity and economic implications have dominated the public agenda and gave an extra impetus for the study of movers and non-movers over the last decade or so. Throughout the program of the Migration Conference you will find various key thematic areas are covered in about 400 presentations by about 400 colleagues coming from all around the world from Australia to Canada, China to Mexico, South Africa to Finland. We are also proud to bring you opportunities to meet with some of the leading scholars in the field. Our line of keynote speakers include Saskia Sassen, Oded Stark, Giuseppe Sciortino, Neli Esipova, and Yüksel Pazarkaya.
Discover the latest research results for both uncoded and coded caching techniques in future wireless network design.