You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book outlines the most important characteristics of IEEE 802.15.4 and ZigBee and how they can be used to engineer Wireless Sensor Network (WSN) systems and applications, with a particular focus on Quality-of-Service (QoS) aspects. It starts by providing a snapshot of the most relevant features of these two protocols, identifying some gaps in the standard specifications. Then it describes several state-of-the-art open-source implementations, models and tools that have been designed by the authors and have been widely used by the international community. The book also outlines the fundamental performance limits of IEEE 802.15.4/ZigBee networks, based on well-sustained analytical, simulation and experimental models, including how to dimension such networks to optimize delay/energy trade-offs.
This book presents insights into how Intelligent Computing and Optimization techniques can be used to attain the goals of Sustainable Development. It provides a comprehensive overview of the latest breakthroughs and recent developments in sustainable, intelligent computing technologies, applications, and optimization techniques across various industries, including business process management, manufacturing, financial sector, agriculture, financial sector, supply chain management, and healthcare. It focuses on computational intelligent techniques and optimization techniques to provide sustainable solutions to many problems. Features: • Provides insights into the theory, implementation, and ...
This open access book constitutes selected papers presented during the 30th Irish Conference on Artificial Intelligence and Cognitive Science, held in Munster, Ireland, in December 2022. The 41 presented papers were thoroughly reviewed and selected from the 102 submissions. They are organized in topical sections on machine learning, deep learning and applications; responsible and trustworthy artificial intelligence; natural language processing and recommender systems; knowledge representation, reasoning, optimisation and intelligent applications.
Middleware is a critical foundation needed to leverage the development of a wide range of mobile and ubiquitous applications. Intrinsic challenges when building such middleware require the combination of expertise from areas like distributed systems, networking, software engineering, and application development. This textbook provides a comprehensive introduction to the main fundamental problems, technologies, paradigms, and solutions of concern to developers of middleware for mobile environments. The contributions are grouped into four parts, on networking and programming issues, communication models, middleware issues, and application issues. Each chapter is structured as a self-contained tutorial, presenting an overview of a specific topic and the state-of-the-art solutions for the related problems. In addition, the book also includes an authoritative reference list. The material has been successfully used in several thematic training schools organized by the ESF MiNEMA (Middleware for Network Eccentric and Mobile Applications) program, and the book's organization and presentation is ideal for an advanced course on middleware.
This book constitutes the thoroughly refereed proceedings of the 4th International Conference on Context-Aware Systems and Applications, ICCASA 2015, held in Vung Tau, Vietnam, in November 2015. The 44 revised full papers presented were carefully selected and reviewed from over 100 submissions. The papers cover a wide spectrum of issues in the area of context-aware systems (CAS) and context-based recommendation systems. CAS is characterized by its self- facets such as self-organization, self-configuration, self-healing, self-optimization, self-protection and so on whose context awareness used to dynamically control computing and networking functions. The overall goal of CAS is to realize nature-inspired autonomic systems that can manage themselves without direct human interventions.
This book constitutes the refereed proceedings of the 18th International Symposium on Formal Methods, FM 2012, held in Paris, France, in August 2012. The 28 revised full papers presented together with 7 tool papers and 3 invited talks were carefully reviewed and selected from numerous submissions. The papers cover several aspects of formal methods, including verification, synthesis, runtime monitoring, testing and controller synthesis, as well as novel applications of formal methods in interesting domains such as satellites, autonomous vehicles and disease dynamics.
This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Marrakech, Morocco, in June 2014. The 27 revised full papers and 14 short papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on intrusion detection, data security, mobile security, privacy, metrics and risk assessment, information flow control, identity management, identifiability and decision making, malicious behavior and fraud and organizational security.
This book constitutes the proceedings of the 6th European Conference on Modelling Foundations and Applications, held in Paris, France, in June 2010.
This book constitutes the revised selected papers of the 10th International Workshop on Data Privacy Management, DPM 2015, and the 4th International Workshop on Quantitative Aspects in Security Assurance, QASA 2015, held in Vienna, Austria, in September 2015, co-located with the 20th European Symposium on Research in Computer Security, ESORICS 2015. In the DPM 2015 workshop edition, 39 submissions were received. In the end, 8 full papers, accompanied by 6 short papers, 2 position papers and 1 keynote were presented in this volume. The QASA workshop series responds to the increasing demand for techniques to deal with quantitative aspects of security assurance at several levels of the development life-cycle of systems and services, from requirements elicitation to run-time operation and maintenance. QASA 2015 received 11 submissions, of which 4 papers are presented in this volume as well.