You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The workshop on an Infrastructure for Mobile and Wireless Systems was held in Scottsdale, Arizona on October 15, 2001 and was funded by the National Science Foundation (NSF) and sponsored by the Telecommunications and Information Technology Institute of the College of Engineering at Florida International U- versity (FIU), to establish a common infrastructure for the discipline of mobile and wireless networking, and to serve its rapidly emerging mobile and wireless community of researchers and practitioners. The workshop provides a single, cohesive, and high-quality forum for disseminating research and experience in this emerging ?eld. Of signi?cance is the integration of many diverse com- ni...
This book constitutes the refereed proceedings of the 4th International Conference on Model and Data Engineering, MEDI 2014, held in Larnaca, Cyprus, in September 2014. The 16 long papers and 12 short papers presented together with 2 invited talks were carefully reviewed and selected from 64 submissions. The papers specifically focus on model engineering and data engineering with special emphasis on most recent and relevant topics in the areas of modeling and models engineering; data engineering; modeling for data management; and applications and tooling.
This book presents the thoroughly refereed joint post-proceedings of three workshops held during the 17th International Conference on Conceptual Modeling, ER '98, in Singapore in November 1998. The 50 revised papers presented have gone through two rounds of reviewing and revision. The book is divided in sections on knowledge discovery, data mining, data and web warehousing, multidimensional databases, data warehouse design, caching, data dissemination, replication, mobile networks, mobile platforms, tracking and monitoring, collaborative work support, temporal data modelling, moving objects and spatial indexing, spatio-temporal databases, and video database contents.
This book is a thoroughly arranged anthology outlining the state of the art in the emerging area of visual informationsystems. The chapters presented are a selection of thoroughly refereed and revised full papers first presented at the First International Conference on visual Information Systems held in February 1996. Next generation information systems have a high visual content, and there will be a shift in emphasis from a paradigm of predominantly alphanumeric data processing to one of visual information processing. The book provides a detailed introductory chapter, two keynotes by leading authorities, sections on design and architecture, database management and modelling, contend-based search and retrieval, feature extraction and indexing, query model and interface, and object recognition and content organization.
This book constitutes the refereed proceedings of the First International Conference on Data Warehousing and Knowledge Discovery, DaWaK'99, held in Florence, Italy in August/September 1999. The 31 revised full papers and nine short papers presented were carefully reviewed and selected from 88 submissions. The book is divided in topical sections on data warehouse design; online analytical processing; view synthesis, selection, and optimization; multidimensional databases; knowledge discovery; association rules; inexing and object similarities; generalized association rules and data and web mining; time series data bases; data mining applications and data analysis.
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards.
This text is based on a simple and fully reactive computational model that allows for intuitive comprehension and logical designs. The principles and techniques presented can be applied to any distributed computing environment (e.g., distributed systems, communication networks, data networks, grid networks, internet, etc.). The text provides a wealth of unique material for learning how to design algorithms and protocols perform tasks efficiently in a distributed computing environment.
The last few years have borne witness to a remarkable diversity of formal methods, with applications to sequential and concurrent software, to real-time and reactive systems, and to hardware design. In that time, many theoretical problems have been tackled and solved, and many continue to be worked upon. Yet it is by the suitability of their industrial application and the extent of their usage that formal methods will ultimately be judged. This volume presents the proceedings of the first international symposium of Formal Methods Europe, FME'93. The symposium focuses on the application of industrial-strength formal methods. Authors address the difficulties of scaling their techniques up to industrial-sized problems, and their suitability in the workplace, and discuss techniques that are formal (that is, they have a mathematical basis) and that are industrially applicable. The volume has four parts: - Invited lectures, containing a lecture by Cliff B. Jones and a lecture by Antonio Cau and Willem-Paul de Roever; - Industrial usage reports, containing 6 reports; - Papers, containing 32 selected and refereedpapers; - Tool descriptions, containing 11 descriptions.