You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book contains articles arising from a conference in honour of mathematician-statistician Miklόs Csörgő on the occasion of his 80th birthday, held in Ottawa in July 2012. It comprises research papers and overview articles, which provide a substantial glimpse of the history and state-of-the-art of the field of asymptotic methods in probability and statistics, written by leading experts. The volume consists of twenty articles on topics on limit theorems for self-normalized processes, planar processes, the central limit theorem and laws of large numbers, change-point problems, short and long range dependent time series, applied probability and stochastic processes, and the theory and methods of statistics. It also includes Csörgő’s list of publications during more than 50 years, since 1962.
The aims of CMIT2013 are to provide a platform for researchers, educators, engineers, and government officials involved in the general areas of management and Information Technology to disseminate their latest research results and exchange views on the fu ture research directions of these fields, to exchange management and information technology and integrate of their practice, application of the academic ideas, improve the academic depth of information technology and its application, provide an internation al communication platform for educational technology and scientific research for the world's universities, business intelligence engineering field experts, professionals, and business exe...
Matrix-analytic methods are fundamental to the analysis of a family of Markov processes rich in structure and of wide applicability. They are extensively used in the modelling and performance analysis of computer systems, telecommunication networks, network protocols and many other stochastic systems of current commercial and engineering interest.This volume deals with: (1) various aspects of the theory of block-structured Markov chains; (2) analysis of complex queueing models; and (3) parameter estimation and specific applications to such areas as cellular mobile systems, FS-ALOHA, the Internet and production systems.
This book includes extended and revised versions of selected papers from the 11th and 12th editions of the International Conference on Operations Research and Enterprise Systems (ICORES 2022 and ICORES 2023). ICORES 2022 was held as a virtual event in February 2022, and ICORES 2023 was held in Lisbon, Portugal, in February 2023. The 5 full papers included in this book were carefully reviewed and selected from the 55 submissions for ICORES 2022, and 8 full papers were reviewed and selected from the 55 submissions for ICORES 2023. The papers are focused on operations research and enterprise systems.
This book constitutes the proceedings of the First International Conference on Frontiers in Cyber Security, held in Chengdu, China, in November 2018. The 18 full papers along with the3 short papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections, namely: symmetric key cryptography, public key cryptography, post-quantum cryptography, cloud security and data deduplication, access control, attack and behavior detection, system and network security, security design.
The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12–14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program Committee members were reviewed by at least ?ve reviewers. P- gram Committee members were allowed to use...
Matrix-analytic and related methods have become recognized as an important and fundamental approach for the mathematical analysis of general classes of complex stochastic models. Research in the area of matrix-analytic and related methods seeks to discover underlying probabilistic structures intrinsic in such stochastic models, develop numerical algorithms for computing functionals (e.g., performance measures) of the underlying stochastic processes, and apply these probabilistic structures and/or computational algorithms within a wide variety of fields. This volume presents recent research results on: the theory, algorithms and methodologies concerning matrix-analytic and related methods in ...
This book constitutes the refereed proceedings of the Third International Conference on Operations Research and Enterprise Systems, ICORES 2014, held in Angers, France, in March 2014. The 18 revised full papers presented together with an invited paper were carefully reviewed and selected from 96 submissions. The papers are organized in topical sections on Methodologies and Technologies and Applications.
This book constitutes revised and selected papers from the 8th International Conference on Operations Research and Enterprise Systems, ICORES 2019, held in Prague, Czech Republic, in February 2019. The 9 extended and revised papers presented in this volume were carefully reviewed and selected from a total of 80 submissions. They were organized in topical sections named methodologies and technologies and applications.
This book constitutes the refereed proceedings of the 7th IEEE International Conference on High Speed Networking and Multimedia Communications, HSNMC 2004, held in Toulouse, France in June/July 2004. The 101 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in topical sections on quality of service, QoS, DiffServ, and performance analysis; scheduling and resource allocation; MPLS; routing and multicast; mobile networks, mobile IP, 3G/UMTS; IEEE 802.11 networks and ad hoc networks; wireless and WLAN; optical networks and WDM; applications and software development; and security and privacy.