You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book contains selected papers from the 8th International Conference on Information Science and Applications (ICISA 2017) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.The intended readerships are researchers in academia, industry and other research institutes focusing on information science and technology.
This book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readership includes researchers in academia, industry and other research institutes focusing on information science and technology.
This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications. The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security. The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community. The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software. The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology.
This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia and industry met to discuss the cutting-edge developments in the field. The book includes papers on mobile and wireless networks, the increasingly important security issues, data management, as well as the latest developments in mobile software development.
This book presents select proceedings of 11th International Conference on Information Science and Applications 2020 (ICISA 2020) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. Also the proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this book, readers can gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.
This book gathers the proceedings of the 4th International Conference on Mobile and Wireless Technology (ICMWT), held in Kuala Lumpur, Malaysia in June 2017, an event that provides researchers and practitioners from both academia and industry with a platform to keep them abreast of cutting-edge developments in the field. The peer-reviewed and accepted papers presented here address topics in a number of major areas: Mobile, Wireless Networks and Applications; Security in Mobile and Wireless; Mobile Data Management and Applications; Mobile Software; Multimedia Communications; Wireless Communications; and Services, Application and Business.
This book and its companion volumes, LNCS vols. 5551, 5552 and 5553, constitute the proceedings of the 6th International Symposium on Neural Networks (ISNN 2009), held during May 26–29, 2009 in Wuhan, China. Over the past few years, ISNN has matured into a well-established premier international symposium on neural n- works and related fields, with a successful sequence of ISNN symposia held in Dalian (2004), Chongqing (2005), Chengdu (2006), Nanjing (2007), and Beijing (2008). Following the tradition of the ISNN series, ISNN 2009 provided a high-level inter- tional forum for scientists, engineers, and educators to present state-of-the-art research in neural networks and related fields, and...
This book constitutes the refereed proceedings of the 10th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN 2010, held in conjunction with the Third Conference on Smart Spaces, ruSMART 2009 in St. Petersburg, Russia, in August 2010. The 27 revised NEW2AN full papers are organized in topical sections on performance evaluation; performance modeling; delay-/disruption-tolerant networking and overlay systems; integrated wireless networks; resource management; and multimedia communications. The 14 revised ruSMART full papers are about smart spaces use cases; smart-M3 platform; and smart spaces solutions.
This proceedings volume provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art in information strategies and technologies of convergence security. The intended readership are researchers in academia, industry, and other research institutes focusing on information science and technology.
The book Intelligent Systems for Science and Information is the remarkable collection of extended chapters from the selected papers that were published in the proceedings of Science and Information (SAI) Conference 2013. It contains twenty-four chapters in the field of Intelligent Systems, which received highly recommended feedback during SAI Conference 2013 review process. All chapters have gone through substantial extension and consolidation and were subject to another round of rigorous review and additional modification. These chapters represent the state of the art of the cutting-edge research and technologies in related areas, and can help inform relevant research communities and individuals of the future development in Science and Information.