You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"This book investigates various definitions of trust and their characteristics in distributed systems and digital computing, and details how to model and implement trust in a digital system"--Provided by publisher.
This commemorative book celebrates the 70th birthday of Arto Kustaa Salomaa, one of the most influential researchers in theoretical computer science. The 24 invited papers by leading researchers in the area address a broad variety of topics in theoretical computer science and impressively reflect the breadth and the depth of Arto Salomaa's scientific work.
Formal Languages and Applications provides a comprehensive study-aid and self-tutorial for graduates students and researchers. The main results and techniques are presented in an readily accessible manner and accompanied by many references and directions for further research. This carefully edited monograph is intended to be the gateway to formal language theory and its applications, so it is very useful as a review and reference source of information in formal language theory.
New, attractive services for communications systems are versatile and promise to make the next generation of communications a success. Yet, as the systems grow more complex and diverse, so do the challenges of managing them. Service management derives from technologies used in fixed telephony systems and has evolved towards supporting packet-based services in an increasingly open environment. It is common belief that 3G (and later 4G) services will change the way we communicate and interrelate. The user will be put at centre stage and systems will be able to handle intelligent user profiles, proactive service selection, context-aware service provisioning and ubiquitous computing. Managing, c...
This book covers many aspects of security for mobility including current developments, underlying technologies, network security, mobile code issues, application security and the future.
The ninth in the series of IMA Conferences on Cryptography and Coding was held (as ever) at the Royal Agricultural College, Cirencester, from 16–18 Dec- ber 2003. The conference’s varied programme of 4 invited and 25 contributed papers is represented in this volume. The contributed papers were selected from the 49 submissions using a - reful refereeing process. The contributed and invited papers are grouped into 5 topics: coding and applications; applications of coding in cryptography; cryp- graphy; cryptanalysis; and network security and protocols. These topic headings represent the breadth of activity in the areas of coding, cryptography and c- munications, and the rich interplay betwe...
This book constitutes the refereed procedings of the 6th International Conference on Autonomic and Trusted Computing, ATC 2009, held in Brisbane, Australia, in July 2009, co-located with UIC 2009, the 6th International Conference on Ubiquitous Intelligence and Computing. The 17 revised full papers presented together with one invited paper and one keynote talk were carefully reviewed and selected from 52 submissions. The regular papers are organized in topical sections on organic and autonomic computing, trusted computing, wireless sensor networks, and trust.
The use of contextually aware, pervasive, distributed computing, and sensor networks to bridge the gap between the physical and online worlds is the basis of mobile social networking. This book shows how applications can be built to provide mobile social networking, the research issues that need to be solved to enable this vision, and how mobile social networking can be used to provide computational intelligence that will improve daily life. With contributions from the fields of sociology, computer science, human-computer interaction and design, this book demonstrates how mobile social networks can be inferred from users' physical interactions both with the environment and with others, as well as how users behave around them and how their behavior differs on mobile vs. traditional online social networks.
The European Congress of Mathematics, held every four years, has established itself as a major international mathematical event. Following those in Paris (1992), Budapest (1996), Barcelona (2000), and Stockholm (2004), the Fifth European Congress of Mathematics (5ECM) took place in Amsterdam, The Netherlands, July 14-18, 2008, with about 1000 participants from 68 different countries. Ten plenary and thirty-three invited lectures were delivered. Three science lectures outlined applications of mathematics in other sciences: climate change, quantum information theory, and population dynamics. As in the four preceding EMS congresses, ten EMS prizes were granted to very promising young mathematic...
This volume is dedicated to Professor Arto Salomaa on the occasion of his 60th birthday. The 32 invited papers contained in the volume were presented at the festive colloquium, organized by Hermann Maurer at Graz, Austria, in June 1994; the contributing authors are well-known scientists with special relations to Professor Salomaa as friends, Ph.D. students, or co-authors. The volume reflects the broad spectrum of Professor Salomaa's research interests in theoretical computer science and mathematics with contributions particularly to automata theory, formal language theory, mathematical logic, computability, and cryptography. The appendix presents Professor Salomaa's curriculum vitae and lists the more than 300 papers and 9 books he published.