Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Artificial Intelligence for Edge Computing
  • Language: en
  • Pages: 373

Artificial Intelligence for Edge Computing

It is undeniable that the recent revival of artificial intelligence (AI) has significantly changed the landscape of science in many application domains, ranging from health to defense and from conversational interfaces to autonomous cars. With terms such as “Google Home”, “Alexa”, and “ChatGPT” becoming household names, the pervasive societal impact of AI is clear. Advances in AI promise a revolution in our interaction with the physical world, a domain where computational intelligence has always been envisioned as a transformative force toward a better tomorrow. Depending on the application family, this domain is often referred to as Ubiquitous Computing, Cyber-Physical Computing...

International Conference on Security and Privacy in Communication Networks
  • Language: en
  • Pages: 635

International Conference on Security and Privacy in Communication Networks

  • Type: Book
  • -
  • Published: 2015-11-21
  • -
  • Publisher: Springer

This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.

International Conference on Security and Privacy in Communication Networks
  • Language: en
  • Pages: 409

International Conference on Security and Privacy in Communication Networks

  • Type: Book
  • -
  • Published: 2015-12-01
  • -
  • Publisher: Springer

This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.

Proceedings of the First International Conference on Computational Intelligence and Informatics
  • Language: en
  • Pages: 724

Proceedings of the First International Conference on Computational Intelligence and Informatics

  • Type: Book
  • -
  • Published: 2016-11-26
  • -
  • Publisher: Springer

The book covers a variety of topics which include data mining and data warehousing, high performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, image processing, computer networks, wireless networks, social networks, wireless sensor networks, information and network security, web security, internet of things, bioinformatics and geoinformatics. The book is a collection of best papers submitted in the First International Conference on Computational Intelligence and Informatics (ICCII 2016) held during 28-30 May 2016 at JNTUH CEH, Hyderabad, India. It was hosted by Department of Computer Science and Engineering, JNTUH College of Engineering in association with Division V (Education & Research) CSI, India.

Federated Learning
  • Language: en
  • Pages: 531

Federated Learning

Federated Learning: A Comprehensive Overview of Methods and Applications presents an in-depth discussion of the most important issues and approaches to federated learning for researchers and practitioners. Federated Learning (FL) is an approach to machine learning in which the training data are not managed centrally. Data are retained by data parties that participate in the FL process and are not shared with any other entity. This makes FL an increasingly popular solution for machine learning tasks for which bringing data together in a centralized repository is problematic, either for privacy, regulatory or practical reasons. This book explains recent progress in research and the state-of-th...

Distributed Multimedia Information Retrieval
  • Language: en
  • Pages: 186

Distributed Multimedia Information Retrieval

  • Type: Book
  • -
  • Published: 2011-05-02
  • -
  • Publisher: Springer

During recent years, huge efforts have been made to establish digital libraries, in a variety of media, offered from a variety of sources, and intended for a variety of professional and private user communities. As digital data collections proliferate, problems of resource selection and data fusion become major issues. Traditional search engines, even the best ones, are unable to provide access to the hidden web of information that is only available via digital library search interfaces. Originating from the SIGIR 2003 Workshop on Distributed Information Retrieval, held in Toronto, Canada in August 2003, this book presents extended and revised workshop papers as well as several invited papers on the topic to round off coverage of the core issues. The papers are devoted to recent research on the design and implementation of methods and tools for resource discovery, resource description, resource selection, data fusion, and user interaction.

Structural Information and Communication Complexity
  • Language: en
  • Pages: 272

Structural Information and Communication Complexity

This book constitutes the refereed proceedings of the 17th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2010, held in Sirince, Turkey, in June 2010. The 19 revised full papers presented were carefully reviewed and selected from 37 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical section on game theory, network algorithms, motion planning, asynchrony, network algorithms, motion planning, topology algorithms, and graph algorithms.

Advances in Computing and Communications, Part IV
  • Language: en
  • Pages: 656

Advances in Computing and Communications, Part IV

This volume is the fourth part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 62 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are the papers of the Workshop on Cloud Computing: Architecture, Algorithms and Applications (CloudComp2011), of the Workshop on Multimedia Streaming (MultiStreams2011), and of the Workshop on Trust Management in P2P Systems (IWTMP2PS2011).

Data Exploration Using Example-Based Methods
  • Language: en
  • Pages: 146

Data Exploration Using Example-Based Methods

Data usually comes in a plethora of formats and dimensions, rendering the exploration and information extraction processes challenging. Thus, being able to perform exploratory analyses in the data with the intent of having an immediate glimpse on some of the data properties is becoming crucial. Exploratory analyses should be simple enough to avoid complicate declarative languages (such as SQL) and mechanisms, and at the same time retain the flexibility and expressiveness of such languages. Recently, we have witnessed a rediscovery of the so-called example-based methods, in which the user, or the analyst, circumvents query languages by using examples as input. An example is a representative o...

Advances in Database Technology - EDBT 2004
  • Language: en
  • Pages: 895

Advances in Database Technology - EDBT 2004

  • Type: Book
  • -
  • Published: 2004-02-12
  • -
  • Publisher: Springer

The 9th International Conference on Extending Database Technology, EDBT 2004, was held in Heraklion, Crete, Greece, during March 14–18, 2004. The EDBT series of conferences is an established and prestigious forum for the exchange of the latest research results in data management. Held every two years in an attractive European location, the conference provides unique opp- tunities for database researchers, practitioners, developers, and users to explore new ideas, techniques, and tools, and to exchange experiences. The previous events were held in Venice, Vienna, Cambridge, Avignon, Valencia, Konstanz, and Prague. EDBT 2004 had the theme “new challenges for database technology,” with th...