You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.
Command and Control (C2) is the set of organizational and technical attributes and processes by which an enterprise marshals and employs human, physical, and information resources to solve problems and accomplish missions.C2 Re-envisioned: The Future of the Enterprise identifies four interrelated megatrends that are individually and collectively sh
This book constitutes the refereed proceedings of the First International Conference on Advances in Parallel, Distributed Computing Technologies and Applications, PDCTA 2011, held in Tirunelveli, India, in September 2011. The 64 revised full papers were carefully reviewed and selected from over 400 submissions. Providing an excellent international forum for sharing knowledge and results in theory, methodology and applications of parallel, distributed computing the papers address all current issues in this field with special focus on algorithms and applications, computer networks, cyber trust and security, wireless networks, as well as mobile computing and bioinformatics.
Machine learning, one of the top emerging sciences, has an extremely broad range of applications. However, many books on the subject provide only a theoretical approach, making it difficult for a newcomer to grasp the subject material. This book provides a more practical approach by explaining the concepts of machine learning algorithms and describing the areas of application for each algorithm, using simple practical examples to demonstrate each algorithm and showing how different issues related to these algorithms are applied.
This book constitutes the proceedings of the First International Conference on Advances in Computing and Information Technology, ACITY 2011, held in Chennai, India, in July 2011. The 55 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers feature significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects.
Compared with conventional communications, cooperative communication allows multiple users in a wireless network to coordinate their packet transmissions and share each other's resources, thus achieving high-performance gain and better service coverage and reliability. Energy Efficient Cooperative Wireless Communication and Networks provides a comprehensive look at energy efficiency and system design of cooperative wireless communication. Introducing effective cooperative wireless communication schemes, the book supplies the understanding and methods required to improve energy efficiency, reliability, and end-to-end protocol designs for wireless communication systems. It explains the practic...
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies
This book constitutes the refereed proceedings of the First International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011, held in Tirunelveli, India, in September 2011. The 73 revised full papers were carefully reviewed and selected from more than 400 initial submissions. The papers feature significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects.
This book constitutes the proceedings of the 22nd International Conference on Computer Information Systems and Industrial Management, CISIM 2023, held in Tokio, Japan, during September 22-24, 2023. The 36 papers presented in this book were carefully reviewed and selected from 77 submissions. They were organized in topical sections as follows: biometrics and pattern recognition applications; computer information systems and security; industrial management and other applications; machine learning and artificial neural networks; modelling and optimization; wellbeing and affective engineering; and machine learning using biometric data and kansei data.
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson networks and communications; wireless and mobile networks; and network security.