You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
We can now say that it is really a big pleasure for us to welcome all of you to the proceedings of CAiSE 2005 which was held in Porto.
"This book highlights and discusses the underlying QoS issues that arise in the delivery of real-time multimedia services over wireless networks"--Provided by publisher.
This book constitutes the proceedings of the 7th International ICST Conference, TridentCom 2011, held in Shanghai, China, in April 2011. Out of numerous submissions the Program Committee finally selected 26 full papers and 2 invited papers. They focus on topics as future Internet testbeds, future wireless testbeds, federated and large scale testbeds, network and resource virtualization, overlay network testbeds, management provisioning and tools for networking research, and experimentally driven research and user experience evaluation.
The two-volume set LNICST 169 and 170 constitutes the thoroughly refereed post-conference proceedings of the Second International Internet of Things Summit, IoT 360° 2015, held in Rome, Italy, in October 2015. The IoT 360° is an event bringing a 360 degree perspective on IoT-related projects in important sectors such as mobility, security, healthcare and urban spaces. The conference also aims to coach involved people on the whole path between research to innovation and the way through to commercialization in the IoT domain. This volume contains 62 revised full papers at the following four conferences: The International Conference on Safety and Security in Internet of Things, SaSeIoT, the International Conference on Smart Objects and Technologies for Social Good, GOODTECHS, the International Conference on Cloud, Networking for IoT systems, CN4IoT, and the International Conference on IoT Technologies for HealthCare, HealthyIoT.
This book constitutes the refereed proceedings of 4 workshops held at the 14th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2018, held in Rhodes, Greece, in May 2018. The workshops were the Workshop on Semantics in the Deep: Semantic Analytics for Big Data, SEDSEAL 2018; the Third Workshop on 5G - Putting Intelligence to the Network Edge, 5G-PINE 2018; the 7th Mining Humanistic Data Workshop, MHDW 2018; and the Workshop on Intelligent Cloud and IOT Paradigms in EHealth, HEALTHIOT 2018. The 19 full papers and 5 short papers presented were carefully reviewed and selected from a total of 53 submissions: SEDSEAL accepted 2 full papers out of 5 submissions, 5G-PINE 6 full and one short paper out of 24, MHDW 7 full and 4 short papers out of 15, and HEALTHIOT 4 full papers out of 9. The papers cover topics such as AI in 5G and telecommunications, AI and e-health services, AI in 5G networks, incremental learning, clustering, AI in text mining, visual data analytics, AI in molecular biology, DNA, RNA, proteins, big data analytics, Internet of Things and recommender systems, and AI in biomedical applications.
This book constitutes the proceedings of the 6th International ICST Conference, TridentCom 2010, held in Berlin, Germany, in May 2010. Out of more than 100 submitted contributions the Program Committee finally selected 15 full papers, 26 practices papers, and 22 posters. They focus on topics as Internet testbeds, future Internet research, wireless sensors, media and mobility, and monitoring in large scale testbeds.
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems. Addresses architecture a...
This book constitutes the proceedings of the Second International Conference on Cloud, Networking for IoT Systems, CN4IoT 2017, and the Second EAI International Conference on ICT Infrastructures and Services for Smart Cities, IISSC 2017, held in Brindisi, Italy, in April 2017. The 26 full papers of both conferences were selected from 39 submissions. CN4IoT presents research activities on the uniform management and operation related to software defined infrastructures, in particular by analyzing limits or advantages in solutions for Cloud Networking and IoT. IISSC papers focus on ICT infrastructures (technologies, models, frameworks) and services in cities and smart communities.
Comprehensive reference on O-RAN technology, covering its history, architecture, security, ecosystem, and more, with didactic resources included throughout Discussing both basic and advanced concepts, Fundamentals of O-RAN delivers a comprehensive summary of O-RAN, covering its history, architecture, control loops and microservices (i.e., xApps and rApps), security, ecosystem, R&D initiatives, and challenges and evolution toward 6G. The book not only includes key theoretical principles of O-RAN, but also provides a framework for the reader to carry out guided hands-on exercises through online auxiliary materials. Homework problems and review questions are included in online auxiliary materia...
Mobile Edge Computing (MEC) provides cloud-like subscription-oriented services at the edge of mobile network. For low latency and high bandwidth services, edge computing assisted IoT (Internet of Things) has become the pillar for the development of smart environments and their applications such as smart home, smart health, smart traffic management, smart agriculture, and smart city. This book covers the fundamental concept of the MEC and its real-time applications. The book content is organized into three parts: Part A covers the architecture and working model of MEC, Part B focuses on the systems, platforms, services and issues of MEC, and Part C emphases on various applications of MEC. This book is targeted for graduate students, researchers, developers, and service providers interested in learning about the state-of-the-art in MEC technologies, innovative applications, and future research directions.