You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the symposia and workshops of the 10th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP. Each of the sympois and workshops focuses on a particular theme and complements the spectrum of the main conference.
This book constitutes the post-conference proceedings of the First International Conference on Smart Grid Inspired Future Technologies, SmartGIFT 2016, held in May 2016 in Liverpool, UK. Smart grid is the next generation electric grid that enables efficient, intelligent, and economical power generation, transmission, and distribution. The 25 revised full papers presented were reviewed and selected from 36 submissions. The papers cover technical topics such as high-level ideology and methodology, concrete smart grid inspired data sensing, processing, and networking technologies, smart grid system architecture, Quality of Service (QoS), energy efficiency, security in smart grid systems, management of smart grid systems, service engineering and algorithm design, and real-world deployment experiences.
Discover the latest advances in computer architecture and software at the dawn of the 5G/6G era In Edge Computing Acceleration from 5G to 6G and Beyond, distinguished researchers Dr. Patrick Hung, Hongwei Kan, and Greg Knopf deliver a comprehensive overview of personal computer architecture and software design usage in the upcoming 5G decade. The authors begin by introducing key components and exploring different hardware acceleration architectures. They move on to discuss 5G data security and data integrity and offer a survey of network virtualization technologies, including accelerated virtualization technologies. The book analyzes 5G/6G system performance, investigating key design conside...
This book explains how to use software-defined networking (SDN) technologies powered by the OpenFlow protocol to build networks that are easy to design, less expensive to build and operate, and more agile and customizable. Among the first books to systematically address the design aspects in SDN/OpenFlow, it presents the insights of expert contributors from around the world. Focused on OpenFlow engineering design and basic principles, it includes coverage of system architectures, language and programming issues, switches, multimedia support, and network operating systems.
This book constitutes the refereed proceedings of the 17th International Conference on Network and System Security, NSS 2023, held in Canterbury, UK, August 14–16, 2023. The 12 full and 9 short papers presented together with 2 invited talks in this book were carefully reviewed and selected from 64 submissions. They focus on Attacks and Malware, Blockchain, Security through Hardware, Machine learning and much more.
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. T...
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks.
This book constitutes the refereed proceedings of the 11th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2012 held in Belgrade, Serbia, July 9-11, 2012. The 36 revised full papers presented were carefully reviewed and selected from 76 submissions. The accepted papers cover a wide spectrum of traditional networking topics ranging from routing to the application layer, to localization in various networking environments such as wireless sensor and ad-hoc networks, and give insights in a variety of application areas.