You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The refereed post-proceedings of the International Conference on Computational Intelligence and Security are presented in this volume. The 116 papers were submitted to two rounds of careful review. Papers cover bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information processing and intrusion detection, systems and security, image and signal processing, and pattern recognition.
Cloud computing was a cloud technology pioneered by Amazon for a long time due to its software technology that is based on the online shopping platform. After Google, Microsoft also follow up, and this technology, in fact, already exists in our lives, and applications continue to expand, become an integral part of life. With the rapid development of the Internet and the demand for high-speed computing of mobile devices, the simplest cloud computing technology has been widely used in online services, such as ,Äúsearch engine, webmail,,Äù and so on. Users can get a lot of information by simply entering a simple instruction. Further cloud computing is not only for data search and analysis function, but also can be used in the biological sciences, such as: analysis of cancer cells, analysis of DNA structure, gene mapping sequencing; in the future more Smart phone, GPS and other mobile devices through the cloud computing to develop more application service.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on High Performance Computing and Applications, HPCA 2009, held in Shangahi, China, in August 2009. The 71 revised papers presented together with 10 invited presentations were carefully selected from 324 submissions. The papers cover topics such as numerical algorithms and solutions; high performance and grid computing; novel approaches to high performance computing; massive data storage and processsing; and hardware acceleration.
This three-volume set of LNCS 14086, LNCS 14087 and LNCS 14088 constitutes - in conjunction with the double-volume set LNAI 14089-14090- the refereed proceedings of the 19th International Conference on Intelligent Computing, ICIC 2023, held in Zhengzhou, China, in August 2023. The 337 full papers of the three proceedings volumes were carefully reviewed and selected from 828 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". Papers that focused on this theme were solicited, addressing theories, methodologies, and applications in science and technology.
This book constitutes the refereed proceedings of the 4th International Information Security Practice and Experience Conference, ISPEC 2008, held in Sydney, Australia, in May 2008. The 29 revised full papers were carefully reviewed and selected from 95 submissions. The papers cover a wide range of topics in mathematics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve based security practice, security computation and so forth.
This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC 2008, held in Shanghai, China in October 2008. The 32 revised full papers presented were carefully selected from over 140 submissions. The papers are organized in topical sections on network technologies; network applications; network and parallel architectures; parallel and distributed software.
Frontiers of Civil Engineering and Disaster Prevention and Control is a compilation of selected papers from The 3rd International Conference on Civil, Architecture and Disaster Prevention and Control (CADPC 2022) and focuses on the research of architecture and disaster prevention in civil engineering. The proceedings features the most cutting-edge research directions and achievements related to construction technology and prevention and control of disaster. Subjects in this proceedings include: Construction Technology Seismicity in Civil Engineering High-Rise Building Construction Disaster Preparedness and Risk Reduction Smart Post-Disaster Rescue These proceedings will promote development of civil engineering and risk reduction, resource sharing, flexibility and high efficiency. Moreover, promote scientific information interchange between scholars from the top universities, research centers and high-tech enterprises working all around the world.
Focuses on the deployment and use of embedded systems in a range of applications. Considering the main directions of research in the field, three main areas are discussed: foundations of security and embedded systems; secure embedded computing systems; and telecommunications and network services.