You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the IFIP Conference on Wireless Sensors and Actor Networks held in Ottawa, Canada, July, 2008. This series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
This book highlights the importance of data-driven techniques to solve wireless communication problems. It presents a number of problems (e.g., related to performance, security, and social networking), and provides solutions using various data-driven techniques, including machine learning, deep learning, federated learning, and artificial intelligence. This book details wireless communication problems that can be solved by data-driven solutions. It presents a generalized approach toward solving problems using specific data-driven techniques. The book also develops a taxonomy of problems according to the type of solution presented and includes several case studies that examine data-driven solutions for issues such as quality of service (QoS) in heterogeneous wireless networks, 5G/6G networks, and security in wireless networks. The target audience of this book includes professionals, researchers, professors, and students working in the field of networking, communications, machine learning, and related fields.
Ad hoc networks, which include a variety of autonomous networks for specific purposes, promise a broad range of civilian, commercial, and military applications. These networks were originally envisioned as collections of autonomous mobile or stationary nodes that dynamically auto-configure themselves into a wireless network without relying on any existing network infrastructure or centralized administration. With the significant advances in the last decade, the concept of ad hoc networks now covers an even broader scope, referring to the many types of autonomous wireless networks designed and deployed for a specific task or function, such as wireless sensor networks, vehicular networks, home...
This book constitutes the refereed proceedings of the 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007, held in Niagara Falls, Canada, in August 2007. The 83 revised full papers presented together with three keynote are cover algorithms and applications, architectures and systems, datamining and databases, fault tolerance and security, middleware and cooperative computing, networks, as well as software and languages.
A team of recognized experts leads the way to dependable computing systems With computers and networks pervading every aspect of daily life, there is an ever-growing demand for dependability. In this unique resource, researchers and organizations will find the tools needed to identify and engage state-of-the-art approaches used for the specification, design, and assessment of dependable computer systems. The first part of the book addresses models and paradigms of dependable computing, and the second part deals with enabling technologies and applications. Tough issues in creating dependable computing systems are also tackled, including: * Verification techniques * Model-based evaluation * Ad...
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
This book constitutes the refereed proceedings of the First International Conference on Distributed Computing and Internet Technology, ICDCIT 2004, held in Bhubaneswar, India in December 2004. The 47 revised papers presented together with 3 invited papers and 5 abstracts of invited or workshop papers were carefully reviewed and selected from 211 submissions. The papers are organized in topical sections on algorithms and modeling; systems, protocols, and performance; transactions and information dissemination; internet query and retrieval; protocol and replica management; ontologies and services; systems analysis and modeling; tools and techniques; systems security; intrusion detection and access control; networks and security; secured systems design; and security services.
Addresses the need for peer-to-peer computing and grid paradigms in delivering efficient service-oriented computing.
The four-volume set CCIS 1580, CCIS 1581, CCIS 1582, and CCIS 1583 contains the extended abstracts of the posters presented during the 24th International Conference on Human-Computer Interaction, HCII 2022, which was held virtually in June - July 2022. The total of 1276 papers and 275 posters included in the 40 HCII 2021 proceedings volumes was carefully reviewed and selected from 5583 submissions. The posters presented in these four volumes are organized in topical sections as follows: Part I: user experience design and evaluation; visual design and visualization; data, information and knowledge; interacting with AI; universal access, accessibility and design for aging. Part II: multimodal and natural interaction; perception, cognition, emotion and psychophysiological monitoring; human motion modelling and monitoring; IoT and intelligent living environments. Part III: learning technologies; HCI, cultural heritage and art; eGovernment and eBusiness; digital commerce and the customer experience; social media and the metaverse. Part IV: virtual and augmented reality; autonomous vehicles and urban mobility; product and robot design; HCI and wellbeing; HCI and cybersecurity.