You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17-19, 2022. The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment. This is an open access book.
This book constitutes selected and revised papers from the Second Silicon Valley Cybersecurity Conference, held in San Jose, USA, in December 2021. Due to the COVID-19 pandemic the conference was held in a virtual format. The 9 full papers and one shoprt paper presented in this volume were thoroughly reviewed and selected from 15 submissions. They present most recent research on dependability, reliability, and security to address cyber-attacks, vulnerabilities, faults, and errors in networks and systems. Chapters 1, 4, 5, 6, and 8-10 are published open access under a CC BY license (Creative Commons Attribution 4.0 International License).
IoT for Defense and National Security Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses challenges in converting defense industrial operations to IoT and summarizes policy recommendations for regulating government use of IoT in free societies. As a modern reference, this book covers multiple technologies in IoT including survivable ta...
This book constitutes the refereed proceedings of the 5th International Congress on Blockchain and Applications 2023, BLOCKCHAIN’23, held in Guimarães, Portugal, in July 2023. Among the scientific community, blockchain and artificial intelligence are a promising combination that will transform the production and manufacturing industry, media, finance, insurance, e-government, etc. Nevertheless, there is no consensus with schemes or best practices that would specify how blockchain and artificial intelligence should be used together. The full papers presented in the main track were carefully reviewed. They contain the latest advances on blockchain and artificial intelligence and on their application domains, exploring innovative ideas, guidelines, theories, models, technologies, and tools and identifying critical issues and challenges that researchers and practitioners must deal with in the future research. The authors would like to thank all the contributing authors, the members of the Program Committees, the sponsors, and the Organizing Committee of the University of Minho and the University of Salamanca for their hard and highly valuable work.
This book constitutes the refereed proceedings of the 13th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2018, held in Guilin, China, in August 2018. The 33 revised full papers presented along with the 13 short papers were carefully reviewed and selected from 150 submissions. The papers of this volume are organized in topical sections on: collaborative models, approaches, algorithms, and systems, social computing, data analysis and machine learning for CSCW and social computing.
Over the past decade, system-on-chip (SoC) designs have evolved to address the ever increasing complexity of applications, fueled by the era of digital convergence. Improvements in process technology have effectively shrunk board-level components so they can be integrated on a single chip. New on-chip communication architectures have been designed to support all inter-component communication in a SoC design. These communication architecture fabrics have a critical impact on the power consumption, performance, cost and design cycle time of modern SoC designs. As application complexity strains the communication backbone of SoC designs, academic and industrial R&D efforts and dollars are increa...
This book constitutes the revised selected papers of the scientific satellite events that were held in conjunction with the 14th International Conference on Service-Oriented Computing, ICSOC 2016, held in Banff, AB, Canada, in October 2016. The ICSOC 2016 workshop track consisted of three workshops on a wide range of topics that fall into the general area of service computing: ASOCA 2016: The rst Workshop on Adaptive Service-oriented and Cloud Applications ISyCC 2016: The rst Workshop on IoT Systems Provisioning & Management in Cloud Computing BSCI 2016: The Second International Workshop on Big Data Services and Computational Intelligence
This IBM® Redbooks® publication can help you tailor and configure DFSMS constructs to be used in an IBM DB2® 9 for z/OS® environment. In addition, it provides a broad understanding of new disk architectures and their impact in DB2 data set management for large installations. This book addresses both the DB2 administrator and the storage administrator. The DB2 administrator can find information about how to use DFSMS for managing DB2 data sets; the storage administrator can find information about the characteristics of DB2 data sets and how DB2 uses the disks. This book describes optimal use of disk storage functions in DB2 for z/OS environments that can best make productive use of the synergy with I/O subsystem on IBM System z®. This book covers the following topics: - Using SMS to manage DB2 catalog, log, data, indexes, image copies, archives, work files - Taking advantage of IBM FlashCopy® for DB2 utilities, striping, copy pools - Setting page sizes and using sliding allocation - A description of PAV, MA, MIDAW, EF, EA, EAV, zHPF and why they are helpful - Compressing data and the use disk and tape for large data sets - Backup and restore, and remote copy services