You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Mobile Networks and Management, MONAMI 2017, held in Melbourne, Australia, in December 2017. The 30 revised full papers were carefully reviewed and selected from 43 submissions. The papers handle topics in the area of mobile computing, wireless networking and management.
A crucial reference tool for the increasing number of scientists who depend upon sensor networks in a widening variety of ways. Coverage includes network design and modeling, network management, data management, security and applications. The topic covered in each chapter receives expository as well as scholarly treatment, covering its history, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest.
This book constitutes the proceedings of the Third International Conference on Frontiers in Cyber Security, FCS 2020, held in Tianjin, China*, in November 2020. The 39 full papers along with the 10 short papers presented were carefully reviewed and selected from 143 submissions. The papers are organized in topical sections on: IoT security; artificial intelligence; blockchain; cyber-physical systems security; cryptography; database security; depth estimation; mobile security; network security; privacy; program analysis; quantum cryptography; steganography; web security. *The conference was held virtually due to the COVID-19 pandemic.
Welcome to 1M 2003, the eighth in a series of the premier international technical conference in this field. As IT management has become mission critical to the economies of the developed world, our technical program has grown in relevance, strength and quality. Over the next few years, leading IT organizations will gradually move from identifying infrastructure problems to providing business services via automated, intelligent management systems. To be successful, these future management systems must provide global scalability, for instance, to support Grid computing and large numbers of pervasive devices. In Grid environments, organizations can pool desktops and servers, dynamically creatin...
The Internet of Vehicles (IoV) is referred to as an efficient and inevitable convergence of the Internet of Things, intelligent transportation systems, edge / fog and cloud computing, and big data, all of which could be intelligently harvested for the cooperative vehicular safety and non-safety applications as well as cooperative mobility management. A secure and low-latency communication is, therefore, indispensable to meet the stringent performance requirements of the safety-critical vehicular applications. Whilst the challenges surrounding low latency are being addressed by the researchers in both academia and industry, it is the security of an IoV network which is of paramount importance...
This book constitutes the proceedings of the 12th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2017, held in Guilin, China, in June 2017.The 70 full papers and 9 short papers presented in this book werde carefully reviewed and selected from 238 submissions. The papers cover various topics such as cognitive radio networks; wireless sensor networks; cyber-physical systems; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobile cloud computing; topology control and coverage; security and privacy; underwater and underground networks; vehicular networks; internet of things; information processing and data management; programmable service interfaces; energy-efficient algorithms; system and protocol design; operating system and middle-ware support; and experimental test-beds, models and case studies.
The question of difference—how to accommodate the complexity and diversity of women’s experiences—remains a central point of reference in debates among feminist thinkers. In Transcultural Feminist Philosophy: Rethinking Difference and Solidarity Through Chinese-American Encounters, Yuanfang Dai addresses influential approaches to the feminist difference critique. Acknowledging that gender oppression assumes different forms in different social and cultural locations, Dai denies that this rules out generalizing about women’s experiences. She proposes a category of women that captures and respects differences and dynamics among women and that can inform possibilities for women in the fu...
The First International Conference on Mobile Lightweight Systems (MOBILIGHT) was held in Athens during May 18–20, 2009. The decision to organize a scientific event on wireless communications, where competition is really enormous, was motivated by discussions with some colleagues about the current unprecedented request for lightweight, wireless communication devices with high usability and performance able to support added-value services in a highly mobile environment. Such devices follow the user everywhere he/she goes (at work, at home, while travelling, in a classroom, etc.), but also result in exciting - search, development and business opportunities. Such a scenario clearly demands significant upgrades to the existing communi- tion paradigm in terms of infrastructure, devices and services to support the anytime, anywhere, any device philosophy, introducing novel and fast-evolving requirements and expectations on research and development in the field of information and com- nication technologies. The core issue is to support the desire of wireless users to have 24/7 network availability and transparent access to "their own" services.
Today, Internet of Things (IoT) is ubiquitous as it is applied in practice in everything from Industrial Control Systems (ICS) to e-Health, e-commerce, Cyber Physical Systems (CPS), smart cities, smart parking, healthcare, supply chain management and many more. Numerous industries, academics, alliances and standardization organizations make an effort on IoT standardization, innovation and development. But there is still a need for a comprehensive framework with integrated standards under one IoT vision. Furthermore, the existing IoT systems are vulnerable to huge range of malicious attacks owing to the massive numbers of deployed IoT systems, inadequate data security standards and the resour...