You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management can lead to costly financial consequences or even result in loss of life. Minimizing potential risks and responding to malicious actions requires innovative approaches for monitoring SCADA systems and protecting them from targeted attacks. SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is designed to help security and networking professional...
This book constitutes the post-proceedings of the 6th International ICST Conference on Mobile Networks and Management, MONAMI 2014, held in Würzburg, Germany, in September 2014. The 22 revised full papers presented were carefully reviewed and selected from 30 submissions. In addition, MONAMI 2014 hosted a workshop on enhanced living environments which also featured 10 papers. The volume is organized thematically in six parts, covering: LTE networks, virtualization and software defined networking, self-organizing networks, energy awareness in wireless networks, wireless networks algorithms and techniques and applications and context-awareness. The workshop on enhanced living environments is organized in thematic sessions on ambient assisted living architectures, human interaction technologies, devises and mobile cloud.
This book constitutes the refereed proceedings of 10 international workshops held in conjunction with the merged 1998 IPPS/SPDP symposia, held in Orlando, Florida, US in March/April 1998. The volume comprises 118 revised full papers presenting cutting-edge research or work in progress. In accordance with the workshops covered, the papers are organized in topical sections on reconfigurable architectures, run-time systems for parallel programming, biologically inspired solutions to parallel processing problems, randomized parallel computing, solving combinatorial optimization problems in parallel, PC based networks of workstations, fault-tolerant parallel and distributed systems, formal methods for parallel programming, embedded HPC systems and applications, and parallel and distributed real-time systems.
The Kuala Lumpur International Conference on Biomedical Engineering (BioMed 2006) was held in December 2006 at the Palace of the Golden Horses, Kuala Lumpur, Malaysia. The papers presented at BioMed 2006, and published here, cover such topics as Artificial Intelligence, Biological effects of non-ionising electromagnetic fields, Biomaterials, Biomechanics, Biomedical Sensors, Biomedical Signal Analysis, Biotechnology, Clinical Engineering, Human performance engineering, Imaging, Medical Informatics, Medical Instruments and Devices, and many more.
Addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks With concerns about global energy consumption at an all-time high, improving computer networks energy efficiency is becoming an increasingly important topic. Large-Scale Distributed Systems and Energy Efficiency: A Holistic View addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks. After an introductory overview of the energy demands of current Information and Communications Technology (ICT), individual chapters offer in-depth analyses of such topics as cloud computing, green netw...
"This book offers historical perspectives on mobile computing, as well as new frameworks and methodologies for mobile networks, intelligent mobile applications, and mobile computing applications"--Provided by publisher.
With the advent of Big Data, conventional communication networks are often limited in their inability to handle complex and voluminous data and information as far as effective processing, transmission, and reception are concerned. This book discusses the evolution of computational intelligence techniques in handling intelligent communication networks. Provides a detailed theoretical foundation of machine learning and computational intelligence algorithms Highlights the state of art machine learning-based solutions for communication networks Presents video demonstrations and code snippets on each chapter for easy understanding of the concepts Discusses applications including resource allocation, spectrum management, channel estimation, and physical layer of wireless networks Demonstrates applications of machine learning techniques for optical networks The text is primarily intended for senior undergraduate and graduate students and academic researchers in fields of electrical engineering, electronics and communication engineering, and computer engineering.
Summarizes the current state and upcoming trends within the area of fog computing Written by some of the leading experts in the field, Fog Computing: Theory and Practice focuses on the technological aspects of employing fog computing in various application domains, such as smart healthcare, industrial process control and improvement, smart cities, and virtual learning environments. In addition, the Machine-to-Machine (M2M) communication methods for fog computing environments are covered in depth. Presented in two parts—Fog Computing Systems and Architectures, and Fog Computing Techniques and Application—this book covers such important topics as energy efficiency and Quality of Service (Q...
A one-stop resource for the use of algorithms and protocols in wireless sensor networks From an established international researcher in the field, this edited volume provides readers with comprehensive coverage of the fundamental algorithms and protocols for wireless sensor networks. It identifies the research that needs to be conducted on a number of levels to design and assess the deployment of wireless sensor networks, and provides an in-depth analysis of the development of the next generation of heterogeneous wireless sensor networks. Divided into nineteen succinct chapters, the book covers: mobility management and resource allocation algorithms; communication models; energy and power co...
New automated, application-independent methodology for designing and deploying sensor networks Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications without much knowledge of the low-level networking aspects of deployment. This new approach is based on the Abstract Task Graph (ATaG), a data-driven programming model and an innovative methodology forarchitecture-independent programming and automatic software synthesis for sensor networks. ATaG programs are concise, understandable, and network-independent descriptions of global application functionality that can be automatically compiled onto any tar...