You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the First International Conference on Quantum Communication and Quantum Networking, QuantumCom 2009, held in Naples, Italy, in October 2009. The 38 full papers were selected from numerous submissions. This conference has been devoted to the discussion of new challenges in quantum communication and quantum networking that extends from the nanoscale devices to global satellite communication networks. It placed particular emphasis on basic quantum science effects and on emerging technological solutions leading to practical applications in the communication industry, culminating with a special section on Hybrid Information Processing.
This book constitutes the refereed proceedings of the 19th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2018, held in Poitiers, France, in September 2018. The 52 full papers presented in this volume were carefully reviewed and selected from 91 submissions. They were organized in topical sections named: video analysis; segmentation and classification; remote sending; biometrics; deep learning; coding and compression; and image restauration and reconstruction.
This book constitutes the refereed proceedings of the 21st International Conference on Computing and Combinatorics, COCOON 2015, held in Beijing, China, in August 2015. The 49 revised full papers and 11 shorter papers presented were carefully reviewed and selected from various submissions. The papers cover various topics including algorithms and data structures; algorithmic game theory; approximation algorithms and online algorithms; automata, languages, logic and computability; complexity theory; computational learning theory; cryptography, reliability and security; database theory, computational biology and bioinformatics; computational algebra, geometry, number theory, graph drawing and information visualization; graph theory, communication networks, optimization and parallel and distributed computing.
Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. P...
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.
Researchers and professionals
Video has rich information including meta-data, visual, audio, spatial and temporal data which can be analysed to extract a variety of low and high-level features to build predictive computational models using machine-learning algorithms to discover interesting patterns, concepts, relations, and associations. This book includes a review of essential topics and discussion of emerging methods and potential applications of video data mining and analytics. It integrates areas like intelligent systems, data mining and knowledge discovery, big data analytics, machine learning, neural network, and deep learning with focus on multimodality video analytics and recent advances in research/applications...
This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography and also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques’ architectures and design, cyber security techniques management, software-defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology.
This book highlights the latest research findings, methods and techniques, as well as challenges and solutions related to Ubiquitous and Pervasive Computing (UPC). In this regard, it employs both theoretical and practical perspectives, and places special emphasis on innovative, mobile and internet services. With the proliferation of wireless technologies and electronic devices, there is a rapidly growing interest in Ubiquitous and Pervasive Computing (UPC). UPC makes it possible to create a human-oriented computing environment in which computer chips are embedded in everyday objects and interact with the physical world. Through UPC, people can remain online even while underway, thus enjoying nearly permanent access to their preferred services. Though it has a great potential to revolutionize our lives, UPC also poses a number of new research challenges.