You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume covers recent developments in the design, operation, and management of mobile telecommunication and computer systems. Uncertainty regarding loading and system parameters leads to challenging optimization and robustness issues. Stochastic modeling combined with optimization theory ensures the optimum end-to-end performance of telecommunication or computer network systems. In view of the diverse design options possible, supporting models have many adjustable parameters and choosing the best set for a particular performance objective is delicate and time-consuming. An optimization based approach determines the optimal possible allocation for these parameters. Researchers and graduate students working at the interface of telecommunications and operations research will benefit from this book. Due to the practical approach, this book will also serve as a reference tool for scientists and engineers in telecommunication and computer networks who depend upon optimization.
This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The 16 revised full papers and 2 plenary keynotes presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor networks, network games, security insurance, security and trust in social networks and security investments.
This volume constitutes the refereed proceedings of the 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices, WISTP 2010, held in Passau, Germany, in April 2010. The 20 revised full papers and 10 short papers were carefully reviewed and selected from 69 submissions. They are organized in topical sections on embedded security, protocols, highly constrained embedded systems, security, smart card security, algorithms, hardware implementations, embedded systems and anonymity/database security.
The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.
This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.
This collection of selected contributions gives an account of recent developments in dynamic game theory and its applications, covering both theoretical advances and new applications of dynamic games in such areas as pursuit-evasion games, ecology, and economics. Written by experts in their respective disciplines, the chapters include stochastic and differential games; dynamic games and their applications in various areas, such as ecology and economics; pursuit-evasion games; and evolutionary game theory and applications. The work will serve as a state-of-the art account of recent advances in dynamic game theory and its applications for researchers, practitioners, and advanced students in applied mathematics, mathematical finance, and engineering.
The emerging trends in computing have increasingly had a network-centric focus. Networked services offered through cloud computing paradigms have replaced applications that would traditionally run on local machines. In addition, the growing usage of applications such as social networking and platforms such as smartphones has resulted in greater need for ubiquitous network access. The consequent heightened demand for networked computing warrants efficient utilization of the limited network resources and more intelligent resource control algorithms, with a focus on providing an enhanced user experience. This thesis examines quality-of-service aware resource control for both wireless and wired ...
This comprehensive resource explores state-of-the-art advances in the successful deployment and operation of small cell networks. A broad range of technical challenges, and possible solutions, are addressed, including practical deployment considerations and interference management techniques, all set within the context of the most recent cutting-edge advances. Key aspects covered include 3GPP standardisation, applications of stochastic geometry, PHY techniques, MIMO techniques, handover and radio resource management, including techniques designed to make the best possible use of the available spectrum. Detailed technical information is provided throughout, with a consistent emphasis on real-world applications. Bringing together world-renowned experts from industry and academia, this is an indispensable volume for researchers, engineers and systems designers in the wireless communication industry.
This book gives a wide-ranging description of the many facets of complex dynamic networks and systems within an infrastructure provided by integrated control and supervision: envisioning, design, experimental exploration, and implementation. The theoretical contributions and the case studies presented can reach control goals beyond those of stabilization and output regulation or even of adaptive control. Reporting on work of the Control of Complex Systems (COSY) research program, Complex Systems follows from and expands upon an earlier collection: Control of Complex Systems by introducing novel theoretical techniques for hard-to-control networks and systems. The major common feature of all t...
Experts in data analytics and power engineering present techniques addressing the needs of modern power systems, covering theory and applications related to power system reliability, efficiency, and security. With topics spanning large-scale and distributed optimization, statistical learning, big data analytics, graph theory, and game theory, this is an essential resource for graduate students and researchers in academia and industry with backgrounds in power systems engineering, applied mathematics, and computer science.