You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Mobile Multimedia Communications, Mobimedia 2021, held in July 2021. Due to COVID-19 pandemic the conference was held virtually. The 66 revised full papers presented were carefully selected from 166 submissions. The papers are organized in topical sections as follows: Internet of Things and Wireless Communications Communication; Strategy Optimization and Task Scheduling Oral Presentations; Privacy Computing Technology; Cyberspace Security and Access control; Neural Networks and Feature Learning Task Classification and Prediction; Object Recognition and Detection.
The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, that is composed of three different volumes.
This book constitutes the refereed proceedings of the 7th International IFIP-TC6 Networking Conference, NETWORKING 2008, held in Singapore, in May 2008. The 82 revised full papers were carefully reviewed and selected from numerous submissions for inclusion in the book. The papers are organized in topical sections on ad hoc and sensor networks: design and optimization, MAC protocol, overlay networking, and routing; next generation internet: authentication, modeling and performance evaluation, multicast, network measurement and testbed, optical networks, peer-to-peer and overlay networking, peer-to-peer services, QoS, routing, security, traffic engineering, and transport protocols; wireless networks: MAC performance, mesh networks, and mixed networks.
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.
The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.
The advances in wireless communication technologies and the proliferation of mobile devices have enabled the realization of intelligent environments for people to c- municate with each other, interact with information-processing devices, and receive a wide range of mobile wireless services through various types of networks and systems everywhere, anytime. A key enabler of this pervasive and ubiquitous connectivity environments is the advancement of software technology in various communication sectors, ranging from communication middleware and operating systems to networking protocols and applications. The international conference series on Mobile Wireless Middleware, Operating Systems, and A...
This book constitutes the refereed proceedings of the 17th International Conference on Green, Pervasive, and Cloud Computing, GPC 2022, held in Chengdu, China, in December 2022. The 19 full papers presented in this book were carefully reviewed and selected from 104 submissions. GPC 2022 shares novel ideas and experiences in the areas of Green, Pervasive, and Cloud Computing.
"This book looks at theory, design, implementation, analysis, and application of handheld computing under four themes: handheld computing for mobile commerce, handheld computing research and technologies, wireless networks and handheld/mobile security, and handheld images and videos"--Provided by publisher.
The present book includes extended and revised versions of a set of selected papers from the 1st International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2011) which was sponsored by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) and held in Noordwijkerhout, The Netherlands. SIMULTECH 2011 was technically co-sponsored by the Society for Modeling & Simulation International (SCS), GDR I3, Lionphant Simulation and Simulation Team and held in cooperation with ACM Special Interest Group on Simulation and Modeling (ACM SIGSIM) and the AIS Special Interest Group of Modeling and Simulation (AIS SIGMAS).
Edge computing is focused on devices and technologies that are attached to the internet of things (IoT). Identifying IoT use across a range of industries and measuring strategic values helps identify what technologies to pursue and can avoid wasted resources on deployments with limited values. Edge Computing and Computational Intelligence Paradigms for the IoT is a critical research book that provides a complete insight on the recent advancements and integration of intelligence in IoT. This book highlights various topics such as disaster prediction, governance, and healthcare. It is an excellent resource for researchers, working professionals, academicians, policymakers, and defense companies.