Store

Computer Security


 

7th International Conference on Practical Applications of Agents and Multi-Agent Systems (Paams'09)

7th International Conference on Practical Applications of Agents and Multi-Agent Systems (Paams'09)
$519.00

PAAMS, the International Conference on Practical Applications of Agents and Multi-Agent Systems is an evolution of the International Workshop on Practical Applications of Agents and Multi-Agent Systems. PAAMS is an international yearly tribune to present, to discuss, and to disseminate the latest developments and the most important outcomes related to real-world applications. It provides a unique opportunity to bring multi-disciplinary experts, academics and practitioners together to exchange their experience in the development of Agents and Multi-Agent Systems. This volume presents the papers that have been accepted for the 2009 edition. These articles capture the most innovative results and this year’s trends: Assisted Cognition, E-Commerce, Grid Computing, Human Modelling, Information Systems, Knowledge Management, Agent-Based Simulation, Software Development, Transports, Trust and Security. Each paper has been reviewed by three different reviewers, from an international committee composed of 64 members from 20 different countries. From the 92 submissions received, 35 were selected for full presentation at the conference, and 26 were accepted as posters.

Mechatronics Engineering and Modern Information Technologies in Industrial Engineering: Selected, Peer Reviewed Papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (M

Mechatronics Engineering and Modern Information Technologies in Industrial Engineering: Selected, Peer Reviewed Papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (M
$466.67

Collection of selected, peer reviewed papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (MEMTIE 2014), October 25-26, 2014, Changsha, Hunan, China. The 664 papers are grouped as follows: Chapter 1: Applied Mechanics and Dynamics, Mechanical Engineering, Manufacturing; Chapter 2: Measurement and Instrumentation, Monitoring, Testing and Detection Technologies; Chapter 3: Mechatronics, Robotics, Automation and Control; Chapter 4: Electronics and Microelectronics, Embedded and Integrated Systems, Communications, Power and Energy, Electric and Magnetic Systems; Chapter 5: Numerical Methods, Computation Methods and Algorithms for Modeling, Simulation and Optimization, Data Mining and Data Processing; Chapter 6: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development; Chapter 7: Materials Engineering, Chemical Engineering and Materials Processing Technologies.

Computer and Computing Technologies in Agriculture II: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture Ccta2008, October 18-20, 2008, Beijing, China

Computer and Computing Technologies in Agriculture II: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture Ccta2008, October 18-20, 2008, Beijing, China
$327.28

This book constitutes the refereed proceedings of the 2nd IFIP International Conference on Computer and Computing Technologies in Agriculture held in Beijing, China on October 18-20, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Dependability Engineering and Complex Systems: Proceedings of the Eleventh International Conference on Dependability and Complex Systems Depcos-Relcom

Dependability Engineering and Complex Systems: Proceedings of the Eleventh International Conference on Dependability and Complex Systems Depcos-Relcom
$309.07

This proceedings present the results of the Eleventh International Conference on Dependability and Complex Systems DepCoS-RELCOMEX which took place in a picturesque Brunï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½w Palace in Poland from 27th June to 1st July, 2016. DepCoS-RELCOMEX is a series of international conferences organized annually by Department of Computer Engineering of Wrocï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½,aw University of Science and Technology since 2006. The roots of the series go as far back as to the seventies of the previous century – the first RELCOMEX conference took place in 1977 – and now its main aim is to promote a multi-disciplinary approach to dependability problems in theory and engineering practice of complex systems. Complex systems, nowadays most often computer-based and distributed, are built upon a variety of technical, information, software and human resources. The challenges in their design, analysis and maintenance not only originate from the involved technical and organizational structures but also from the complexity of the information processes that must be efficiently executed in a diverse, often hostile operational environment. Traditional methods of reliability evaluation focused only on technical resources are usually insufficient in this context and more innovative, multidisciplinary methods of dependability analysis must be applied. The diversity of the topics which need to be considered is well illustrated by the selection of the submissions in these proceedings with their subjects ranging from mathematical models and design methodologies through software engineering and data security issues up to practical problems in technical, e.g. transportation, and systems.

Ict and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II: Hosted by Csi Vishakapatnam Chapter

Ict and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II: Hosted by Csi Vishakapatnam Chapter
$271.70

This volume contains 85 papers presented at CSI 2013: 48th Annual Convention of Computer Society of India with the theme "ICT and Critical Infrastructure". The convention was held during 13th -15th December 2013 at Hotel Novotel Varun Beach, Visakhapatnam and hosted by Computer Society of India, Vishakhapatnam Chapter in association with Vishakhapatnam Steel Plant, the flagship company of RINL, India. This volume contains papers mainly focused on Data Mining, Data Engineering and Image Processing, Software Engineering and Bio-Informatics, Network Security, Digital Forensics and Cyber Crime, Internet and Multimedia Applications and E-Governance Applications.

New Technologies for Digital Crime and Forensics: Devices, Applications, and Software

New Technologies for Digital Crime and Forensics: Devices, Applications, and Software
$256.25

A must-have tutorial on browser hacking Web browsers are everywhere. Not just as gateways to businesses, but also on phones, in cars, on TVs, and even on the International Space Station. Imagine what this means if someone is able to hack those browsers. "The Browser Hacker’s Handbook" tackles the topic head-on. Written by a team of computer security experts, this in-depth book covers the many ways hackers gain access to browsers and lays out practical methods for attack and defense. It’s a solid, hands-on tutorial for IT and security consultants, or anyone responsible for computer security. Web browsers are rapidly becoming the operating systems of the world, and they have special vulnerabilities that hackers exploitThis unique book is a tutorial on browser hacking for anyone responsible for computer securityCovers how hackers attack the users, web, and intranets via browsersExplores a host of security and technology issues including SSL, spoofing, phishing, DNS tunneling, fingerprinting, malware, XSS, exploitation and moreBecome an ethical hacker, protect your browsers, and beat the bad guys at their own game with "The Browser Hacker’s Handbook."

Computational Intelligence for Decision Support in Cyber-Physical Systems (Studies in Computational Intelligence) (Hardcover)

Computational Intelligence for Decision Support in Cyber-Physical Systems (Studies in Computational Intelligence) (Hardcover)
$256.24

This book is dedicated to applied computational intelligence and soft computing techniques with special reference to decision support in Cyber Physical Systems (CPS), where the physical as well as the communication segment of the networked entities interact with each other. The joint dynamics of such systems result in a complex combination of computers, software, networks and physical processes all combined to establish a process flow at system level. This volume provides the audience with an in-depth vision about how to ensure dependability, safety, security and efficiency in real time by making use of computational intelligence in various CPS applications ranging from the nano-world to large scale wide area systems of systems. Key application areas include healthcare, transportation, energy, process control and robotics where intelligent decision support has key significance in establishing dynamic, ever-changing and high confidence future technologies. A recommended text for graduate students and researchers working on the applications of computational intelligence methods in CPS.

Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 – 26, 20

Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 - 26, 20
$246.98

This book constitutes the refereed proceedings of the 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008) held in Tokyo, Japan on September 24-26, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Digital Information and Communication Technology and Its Applications: International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings

Digital Information and Communication Technology and Its Applications: International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings
$240.88

This two-volume set CCIS 166 and CCIS 167constitutes the refereed proceedings of the International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2011, held in Dijon, France, in June 2010. The 128 revised full papers presented in both volumes were carefully reviewed and selected from330 submissions. The papers are organized in topical sections on Web applications; image processing; visual interfaces and user experience; network security; ad hoc network; cloud computing; Data Compression; Software Engineering; Networking and Mobiles; Distributed and Parallel processing; social networks; ontology; algorithms; multimedia; e-learning; interactive environments and emergent technologies for e-learning; signal processing; information and data management.

Data Mining and Knowledge Discovery Handbook

Data Mining and Knowledge Discovery Handbook
$234.69

Knowledge Discovery demonstrates intelligent computing at its best, and is the most desirable and interesting end-product of Information Technology. To be able to discover and to extract knowledge from data is a task that many researchers and practitioners are endeavoring to accomplish. There is a lot of hidden knowledge waiting to be discovered this is the challenge created by today s abundance of data. Data Mining and Knowledge Discovery Handbook, 2nd Edition organizes the most current concepts, theories, standards, methodologies, trends, challenges and applications of data mining (DM) and knowledge discovery in databases (KDD) into a coherent and unified repository. This handbook first surveys, then provides comprehensive yet concise algorithmic descriptions of methods, including classic methods plus the extensions and novel methods developed recently. This volume concludes with in-depth descriptions of data mining applications in various interdisciplinary industries including finance, marketing, medicine, biology, engineering, telecommunications, software, and security. Data Mining and Knowledge Discovery Handbook, 2nd Edition is designed for research scientists, libraries and advanced-level students in computer science and engineering as a reference. This handbook is also suitable for professionals in industry, for computing applications, information systems management, and strategic research management.

Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings

Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings
$229.79

This volume is the third part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 70 revised full papers presented in this volume were carefullyreviewed and selected from a large number of submissions. The papers are organized in topical sections on security, trust and privacy; sensor networks; signal and image processing; soft computing techniques; system software; vehicular communications networks.

Intelligence and Security Informatics for International Security: Information Sharing and Data Mining

Intelligence and Security Informatics for International Security: Information Sharing and Data Mining
$225.37

Reflects a decade of leading-edge research on intelligence and security informatics. Dr Chen is researcher at the Artificial Intelligence Laboratory and the NSF COPLINK Center for Homeland Security Information Technology Research. Describes real-world community situations. Targets wide-ranging audience: from researchers in computer science, information management and information science via analysts and policy makers in federal departments and national laboratories to consultants in IT hardware, communication, and software companies.

Embedded Software And Systems: Second International Conference, Icess 2005, Xi'an, China, December 16-18, 2005, Proceedings

Embedded Software And Systems: Second International Conference, Icess 2005, Xi'an, China, December 16-18, 2005, Proceedings
$222.89

This book constitutes the refereed proceedings of the Second International Conference on Embedded Software and Systems, ICESS 2005, held in Xi’an, China, in December 2005. The 63 revised full papers presented together with the abstracts of 3 keynote speeches were thoroughly reviewed and selected from 361 submissions. The papers are organized in topical sections on embedded hardware, embedded software, real-time systems, power aware computing, hardware/software co-design and system-on-chip, testing and verification, reconfigurable computing, agent and distributed computing, wireless communications, mobile computing, pervasive/ubiquitous computing and intelligence, multimedia and human-computer interaction, network protocol, security and fault-tolerance, and abstracts of eight selected workshop papers.

Intelligent Information Processing IV

Intelligent Information Processing IV
$218.70

This book constitutes the refereed proceedings of the 5th IFIP International Conference on Intelligent Information Processing held in Beijing, China on October 19-22, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Computer and Computing Technologies in Agriculture 2: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture, Ccta2008, October 18-20, 2008, Beijing, China

Computer and Computing Technologies in Agriculture 2: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture, Ccta2008, October 18-20, 2008, Beijing, China
$201.01

This book constitutes the refereed proceedings of the 2nd IFIP International Conference on Computer and Computing Technologies in Agriculture held in Beijing, China on October 18-20, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings

Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings
$198.52

This book constitutes the proceedings of the 15th European Symposium on Computer Security held in Athens, Greece in September 2010. The 42 papers included in the book were carefully reviewed and selected from 201 papers. The articles are organized in topical sections on RFID and Privacy, Software Security, Cryptographic Protocols, Traffic Analysis, End-User Security, Formal Analysis, E-voting and Broadcast, Authentication, Access Control, Authorization and Attestation, Anonymity and Unlinkability, Network Security and Economics, as well as Secure Update, DOS and Intrustion Detection.

Informatics Engineering and Information Science: International Conference, Icieis 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part II

Informatics Engineering and Information Science: International Conference, Icieis 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part II
$197.51

This 4-Volume-Set, CCIS 0251 – CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011.The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-learning, information security, software engineering, image processing, algorithms, artificial intelligence and soft computing, e-commerce, data mining, neural networks, social networks, grid computing, biometric technologies, networks, distributed and parallel computing, wireless networks, information and data management, web applications and software systems, multimedia, ad hoc networks, mobile computing, as well as miscellaneous topics in digital information and communications.

Virtual Community Building and the Information Society: Current and Future Directions

Virtual Community Building and the Information Society: Current and Future Directions
$195.00

Emergent technologies, including ambient intelligence and pervasive computing, promise a considerable advance in the way people use virtual communities, and new, innovative applications are making virtual communities more dynamic and usable than ever. Virtual Community Building and the Information Society: Current and Future Directions offers a holistic approach to virtual communities, providing relevant theoretical frameworks and presenting the latest empirical research on virtual technology, infrastructures, content modeling, knowledge modeling, content management, context awareness, mobility, security and trust. It also explores the social impact and applications of virtual communities, providing valuable insights for professionals, researchers, and managers in fields including information systems, computer science, knowledge management, software engineering, healthcare, business, information and communication sciences, education, and sociology who want to improve their understanding of the strategic role of virtual communities in the information society.

7th International Conference on Practical Applications of Agents and Multi-Agent Systems (Paams'09)

7th International Conference on Practical Applications of Agents and Multi-Agent Systems (Paams'09)
$519.00

PAAMS, the International Conference on Practical Applications of Agents and Multi-Agent Systems is an evolution of the International Workshop on Practical Applications of Agents and Multi-Agent Systems. PAAMS is an international yearly tribune to present, to discuss, and to disseminate the latest developments and the most important outcomes related to real-world applications. It provides a unique opportunity to bring multi-disciplinary experts, academics and practitioners together to exchange their experience in the development of Agents and Multi-Agent Systems. This volume presents the papers that have been accepted for the 2009 edition. These articles capture the most innovative results and this year’s trends: Assisted Cognition, E-Commerce, Grid Computing, Human Modelling, Information Systems, Knowledge Management, Agent-Based Simulation, Software Development, Transports, Trust and Security. Each paper has been reviewed by three different reviewers, from an international committee composed of 64 members from 20 different countries. From the 92 submissions received, 35 were selected for full presentation at the conference, and 26 were accepted as posters.

Mechatronics Engineering and Modern Information Technologies in Industrial Engineering: Selected, Peer Reviewed Papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (M

Mechatronics Engineering and Modern Information Technologies in Industrial Engineering: Selected, Peer Reviewed Papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (M
$466.67

Collection of selected, peer reviewed papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (MEMTIE 2014), October 25-26, 2014, Changsha, Hunan, China. The 664 papers are grouped as follows: Chapter 1: Applied Mechanics and Dynamics, Mechanical Engineering, Manufacturing; Chapter 2: Measurement and Instrumentation, Monitoring, Testing and Detection Technologies; Chapter 3: Mechatronics, Robotics, Automation and Control; Chapter 4: Electronics and Microelectronics, Embedded and Integrated Systems, Communications, Power and Energy, Electric and Magnetic Systems; Chapter 5: Numerical Methods, Computation Methods and Algorithms for Modeling, Simulation and Optimization, Data Mining and Data Processing; Chapter 6: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development; Chapter 7: Materials Engineering, Chemical Engineering and Materials Processing Technologies.

Computer and Computing Technologies in Agriculture II: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture Ccta2008, October 18-20, 2008, Beijing, China

Computer and Computing Technologies in Agriculture II: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture Ccta2008, October 18-20, 2008, Beijing, China
$327.28

This book constitutes the refereed proceedings of the 2nd IFIP International Conference on Computer and Computing Technologies in Agriculture held in Beijing, China on October 18-20, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Dependability Engineering and Complex Systems: Proceedings of the Eleventh International Conference on Dependability and Complex Systems Depcos-Relcom

Dependability Engineering and Complex Systems: Proceedings of the Eleventh International Conference on Dependability and Complex Systems Depcos-Relcom
$309.07

This proceedings present the results of the Eleventh International Conference on Dependability and Complex Systems DepCoS-RELCOMEX which took place in a picturesque Brunï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½w Palace in Poland from 27th June to 1st July, 2016. DepCoS-RELCOMEX is a series of international conferences organized annually by Department of Computer Engineering of Wrocï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½,aw University of Science and Technology since 2006. The roots of the series go as far back as to the seventies of the previous century – the first RELCOMEX conference took place in 1977 – and now its main aim is to promote a multi-disciplinary approach to dependability problems in theory and engineering practice of complex systems. Complex systems, nowadays most often computer-based and distributed, are built upon a variety of technical, information, software and human resources. The challenges in their design, analysis and maintenance not only originate from the involved technical and organizational structures but also from the complexity of the information processes that must be efficiently executed in a diverse, often hostile operational environment. Traditional methods of reliability evaluation focused only on technical resources are usually insufficient in this context and more innovative, multidisciplinary methods of dependability analysis must be applied. The diversity of the topics which need to be considered is well illustrated by the selection of the submissions in these proceedings with their subjects ranging from mathematical models and design methodologies through software engineering and data security issues up to practical problems in technical, e.g. transportation, and systems.

Ict and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II: Hosted by Csi Vishakapatnam Chapter

Ict and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II: Hosted by Csi Vishakapatnam Chapter
$271.70

This volume contains 85 papers presented at CSI 2013: 48th Annual Convention of Computer Society of India with the theme "ICT and Critical Infrastructure". The convention was held during 13th -15th December 2013 at Hotel Novotel Varun Beach, Visakhapatnam and hosted by Computer Society of India, Vishakhapatnam Chapter in association with Vishakhapatnam Steel Plant, the flagship company of RINL, India. This volume contains papers mainly focused on Data Mining, Data Engineering and Image Processing, Software Engineering and Bio-Informatics, Network Security, Digital Forensics and Cyber Crime, Internet and Multimedia Applications and E-Governance Applications.

New Technologies for Digital Crime and Forensics: Devices, Applications, and Software

New Technologies for Digital Crime and Forensics: Devices, Applications, and Software
$256.25

A must-have tutorial on browser hacking Web browsers are everywhere. Not just as gateways to businesses, but also on phones, in cars, on TVs, and even on the International Space Station. Imagine what this means if someone is able to hack those browsers. "The Browser Hacker’s Handbook" tackles the topic head-on. Written by a team of computer security experts, this in-depth book covers the many ways hackers gain access to browsers and lays out practical methods for attack and defense. It’s a solid, hands-on tutorial for IT and security consultants, or anyone responsible for computer security. Web browsers are rapidly becoming the operating systems of the world, and they have special vulnerabilities that hackers exploitThis unique book is a tutorial on browser hacking for anyone responsible for computer securityCovers how hackers attack the users, web, and intranets via browsersExplores a host of security and technology issues including SSL, spoofing, phishing, DNS tunneling, fingerprinting, malware, XSS, exploitation and moreBecome an ethical hacker, protect your browsers, and beat the bad guys at their own game with "The Browser Hacker’s Handbook."

Computational Intelligence for Decision Support in Cyber-Physical Systems (Studies in Computational Intelligence) (Hardcover)

Computational Intelligence for Decision Support in Cyber-Physical Systems (Studies in Computational Intelligence) (Hardcover)
$256.24

This book is dedicated to applied computational intelligence and soft computing techniques with special reference to decision support in Cyber Physical Systems (CPS), where the physical as well as the communication segment of the networked entities interact with each other. The joint dynamics of such systems result in a complex combination of computers, software, networks and physical processes all combined to establish a process flow at system level. This volume provides the audience with an in-depth vision about how to ensure dependability, safety, security and efficiency in real time by making use of computational intelligence in various CPS applications ranging from the nano-world to large scale wide area systems of systems. Key application areas include healthcare, transportation, energy, process control and robotics where intelligent decision support has key significance in establishing dynamic, ever-changing and high confidence future technologies. A recommended text for graduate students and researchers working on the applications of computational intelligence methods in CPS.

Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 – 26, 20

Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 - 26, 20
$246.98

This book constitutes the refereed proceedings of the 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008) held in Tokyo, Japan on September 24-26, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Digital Information and Communication Technology and Its Applications: International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings

Digital Information and Communication Technology and Its Applications: International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings
$240.88

This two-volume set CCIS 166 and CCIS 167constitutes the refereed proceedings of the International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2011, held in Dijon, France, in June 2010. The 128 revised full papers presented in both volumes were carefully reviewed and selected from330 submissions. The papers are organized in topical sections on Web applications; image processing; visual interfaces and user experience; network security; ad hoc network; cloud computing; Data Compression; Software Engineering; Networking and Mobiles; Distributed and Parallel processing; social networks; ontology; algorithms; multimedia; e-learning; interactive environments and emergent technologies for e-learning; signal processing; information and data management.

Data Mining and Knowledge Discovery Handbook

Data Mining and Knowledge Discovery Handbook
$234.69

Knowledge Discovery demonstrates intelligent computing at its best, and is the most desirable and interesting end-product of Information Technology. To be able to discover and to extract knowledge from data is a task that many researchers and practitioners are endeavoring to accomplish. There is a lot of hidden knowledge waiting to be discovered this is the challenge created by today s abundance of data. Data Mining and Knowledge Discovery Handbook, 2nd Edition organizes the most current concepts, theories, standards, methodologies, trends, challenges and applications of data mining (DM) and knowledge discovery in databases (KDD) into a coherent and unified repository. This handbook first surveys, then provides comprehensive yet concise algorithmic descriptions of methods, including classic methods plus the extensions and novel methods developed recently. This volume concludes with in-depth descriptions of data mining applications in various interdisciplinary industries including finance, marketing, medicine, biology, engineering, telecommunications, software, and security. Data Mining and Knowledge Discovery Handbook, 2nd Edition is designed for research scientists, libraries and advanced-level students in computer science and engineering as a reference. This handbook is also suitable for professionals in industry, for computing applications, information systems management, and strategic research management.

Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings

Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings
$229.79

This volume is the third part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 70 revised full papers presented in this volume were carefullyreviewed and selected from a large number of submissions. The papers are organized in topical sections on security, trust and privacy; sensor networks; signal and image processing; soft computing techniques; system software; vehicular communications networks.

Intelligence and Security Informatics for International Security: Information Sharing and Data Mining

Intelligence and Security Informatics for International Security: Information Sharing and Data Mining
$225.37

Reflects a decade of leading-edge research on intelligence and security informatics. Dr Chen is researcher at the Artificial Intelligence Laboratory and the NSF COPLINK Center for Homeland Security Information Technology Research. Describes real-world community situations. Targets wide-ranging audience: from researchers in computer science, information management and information science via analysts and policy makers in federal departments and national laboratories to consultants in IT hardware, communication, and software companies.

Embedded Software And Systems: Second International Conference, Icess 2005, Xi'an, China, December 16-18, 2005, Proceedings

Embedded Software And Systems: Second International Conference, Icess 2005, Xi'an, China, December 16-18, 2005, Proceedings
$222.89

This book constitutes the refereed proceedings of the Second International Conference on Embedded Software and Systems, ICESS 2005, held in Xi’an, China, in December 2005. The 63 revised full papers presented together with the abstracts of 3 keynote speeches were thoroughly reviewed and selected from 361 submissions. The papers are organized in topical sections on embedded hardware, embedded software, real-time systems, power aware computing, hardware/software co-design and system-on-chip, testing and verification, reconfigurable computing, agent and distributed computing, wireless communications, mobile computing, pervasive/ubiquitous computing and intelligence, multimedia and human-computer interaction, network protocol, security and fault-tolerance, and abstracts of eight selected workshop papers.

Intelligent Information Processing IV

Intelligent Information Processing IV
$218.70

This book constitutes the refereed proceedings of the 5th IFIP International Conference on Intelligent Information Processing held in Beijing, China on October 19-22, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Computer and Computing Technologies in Agriculture 2: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture, Ccta2008, October 18-20, 2008, Beijing, China

Computer and Computing Technologies in Agriculture 2: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture, Ccta2008, October 18-20, 2008, Beijing, China
$201.01

This book constitutes the refereed proceedings of the 2nd IFIP International Conference on Computer and Computing Technologies in Agriculture held in Beijing, China on October 18-20, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings

Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings
$198.52

This book constitutes the proceedings of the 15th European Symposium on Computer Security held in Athens, Greece in September 2010. The 42 papers included in the book were carefully reviewed and selected from 201 papers. The articles are organized in topical sections on RFID and Privacy, Software Security, Cryptographic Protocols, Traffic Analysis, End-User Security, Formal Analysis, E-voting and Broadcast, Authentication, Access Control, Authorization and Attestation, Anonymity and Unlinkability, Network Security and Economics, as well as Secure Update, DOS and Intrustion Detection.

Informatics Engineering and Information Science: International Conference, Icieis 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part II

Informatics Engineering and Information Science: International Conference, Icieis 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part II
$197.51

This 4-Volume-Set, CCIS 0251 – CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011.The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-learning, information security, software engineering, image processing, algorithms, artificial intelligence and soft computing, e-commerce, data mining, neural networks, social networks, grid computing, biometric technologies, networks, distributed and parallel computing, wireless networks, information and data management, web applications and software systems, multimedia, ad hoc networks, mobile computing, as well as miscellaneous topics in digital information and communications.

Virtual Community Building and the Information Society: Current and Future Directions

Virtual Community Building and the Information Society: Current and Future Directions
$195.00

Emergent technologies, including ambient intelligence and pervasive computing, promise a considerable advance in the way people use virtual communities, and new, innovative applications are making virtual communities more dynamic and usable than ever. Virtual Community Building and the Information Society: Current and Future Directions offers a holistic approach to virtual communities, providing relevant theoretical frameworks and presenting the latest empirical research on virtual technology, infrastructures, content modeling, knowledge modeling, content management, context awareness, mobility, security and trust. It also explores the social impact and applications of virtual communities, providing valuable insights for professionals, researchers, and managers in fields including information systems, computer science, knowledge management, software engineering, healthcare, business, information and communication sciences, education, and sociology who want to improve their understanding of the strategic role of virtual communities in the information society.

7th International Conference on Practical Applications of Agents and Multi-Agent Systems (Paams'09)

7th International Conference on Practical Applications of Agents and Multi-Agent Systems (Paams'09)
$519.00

PAAMS, the International Conference on Practical Applications of Agents and Multi-Agent Systems is an evolution of the International Workshop on Practical Applications of Agents and Multi-Agent Systems. PAAMS is an international yearly tribune to present, to discuss, and to disseminate the latest developments and the most important outcomes related to real-world applications. It provides a unique opportunity to bring multi-disciplinary experts, academics and practitioners together to exchange their experience in the development of Agents and Multi-Agent Systems. This volume presents the papers that have been accepted for the 2009 edition. These articles capture the most innovative results and this year’s trends: Assisted Cognition, E-Commerce, Grid Computing, Human Modelling, Information Systems, Knowledge Management, Agent-Based Simulation, Software Development, Transports, Trust and Security. Each paper has been reviewed by three different reviewers, from an international committee composed of 64 members from 20 different countries. From the 92 submissions received, 35 were selected for full presentation at the conference, and 26 were accepted as posters.

Mechatronics Engineering and Modern Information Technologies in Industrial Engineering: Selected, Peer Reviewed Papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (M

Mechatronics Engineering and Modern Information Technologies in Industrial Engineering: Selected, Peer Reviewed Papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (M
$466.67

Collection of selected, peer reviewed papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (MEMTIE 2014), October 25-26, 2014, Changsha, Hunan, China. The 664 papers are grouped as follows: Chapter 1: Applied Mechanics and Dynamics, Mechanical Engineering, Manufacturing; Chapter 2: Measurement and Instrumentation, Monitoring, Testing and Detection Technologies; Chapter 3: Mechatronics, Robotics, Automation and Control; Chapter 4: Electronics and Microelectronics, Embedded and Integrated Systems, Communications, Power and Energy, Electric and Magnetic Systems; Chapter 5: Numerical Methods, Computation Methods and Algorithms for Modeling, Simulation and Optimization, Data Mining and Data Processing; Chapter 6: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development; Chapter 7: Materials Engineering, Chemical Engineering and Materials Processing Technologies.

Computer and Computing Technologies in Agriculture II: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture Ccta2008, October 18-20, 2008, Beijing, China

Computer and Computing Technologies in Agriculture II: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture Ccta2008, October 18-20, 2008, Beijing, China
$327.28

This book constitutes the refereed proceedings of the 2nd IFIP International Conference on Computer and Computing Technologies in Agriculture held in Beijing, China on October 18-20, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Dependability Engineering and Complex Systems: Proceedings of the Eleventh International Conference on Dependability and Complex Systems Depcos-Relcom

Dependability Engineering and Complex Systems: Proceedings of the Eleventh International Conference on Dependability and Complex Systems Depcos-Relcom
$309.07

This proceedings present the results of the Eleventh International Conference on Dependability and Complex Systems DepCoS-RELCOMEX which took place in a picturesque Brunï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½w Palace in Poland from 27th June to 1st July, 2016. DepCoS-RELCOMEX is a series of international conferences organized annually by Department of Computer Engineering of Wrocï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½,aw University of Science and Technology since 2006. The roots of the series go as far back as to the seventies of the previous century – the first RELCOMEX conference took place in 1977 – and now its main aim is to promote a multi-disciplinary approach to dependability problems in theory and engineering practice of complex systems. Complex systems, nowadays most often computer-based and distributed, are built upon a variety of technical, information, software and human resources. The challenges in their design, analysis and maintenance not only originate from the involved technical and organizational structures but also from the complexity of the information processes that must be efficiently executed in a diverse, often hostile operational environment. Traditional methods of reliability evaluation focused only on technical resources are usually insufficient in this context and more innovative, multidisciplinary methods of dependability analysis must be applied. The diversity of the topics which need to be considered is well illustrated by the selection of the submissions in these proceedings with their subjects ranging from mathematical models and design methodologies through software engineering and data security issues up to practical problems in technical, e.g. transportation, and systems.

Ict and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II: Hosted by Csi Vishakapatnam Chapter

Ict and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II: Hosted by Csi Vishakapatnam Chapter
$271.70

This volume contains 85 papers presented at CSI 2013: 48th Annual Convention of Computer Society of India with the theme "ICT and Critical Infrastructure". The convention was held during 13th -15th December 2013 at Hotel Novotel Varun Beach, Visakhapatnam and hosted by Computer Society of India, Vishakhapatnam Chapter in association with Vishakhapatnam Steel Plant, the flagship company of RINL, India. This volume contains papers mainly focused on Data Mining, Data Engineering and Image Processing, Software Engineering and Bio-Informatics, Network Security, Digital Forensics and Cyber Crime, Internet and Multimedia Applications and E-Governance Applications.

New Technologies for Digital Crime and Forensics: Devices, Applications, and Software

New Technologies for Digital Crime and Forensics: Devices, Applications, and Software
$256.25

A must-have tutorial on browser hacking Web browsers are everywhere. Not just as gateways to businesses, but also on phones, in cars, on TVs, and even on the International Space Station. Imagine what this means if someone is able to hack those browsers. "The Browser Hacker’s Handbook" tackles the topic head-on. Written by a team of computer security experts, this in-depth book covers the many ways hackers gain access to browsers and lays out practical methods for attack and defense. It’s a solid, hands-on tutorial for IT and security consultants, or anyone responsible for computer security. Web browsers are rapidly becoming the operating systems of the world, and they have special vulnerabilities that hackers exploitThis unique book is a tutorial on browser hacking for anyone responsible for computer securityCovers how hackers attack the users, web, and intranets via browsersExplores a host of security and technology issues including SSL, spoofing, phishing, DNS tunneling, fingerprinting, malware, XSS, exploitation and moreBecome an ethical hacker, protect your browsers, and beat the bad guys at their own game with "The Browser Hacker’s Handbook."

Computational Intelligence for Decision Support in Cyber-Physical Systems (Studies in Computational Intelligence) (Hardcover)

Computational Intelligence for Decision Support in Cyber-Physical Systems (Studies in Computational Intelligence) (Hardcover)
$256.24

This book is dedicated to applied computational intelligence and soft computing techniques with special reference to decision support in Cyber Physical Systems (CPS), where the physical as well as the communication segment of the networked entities interact with each other. The joint dynamics of such systems result in a complex combination of computers, software, networks and physical processes all combined to establish a process flow at system level. This volume provides the audience with an in-depth vision about how to ensure dependability, safety, security and efficiency in real time by making use of computational intelligence in various CPS applications ranging from the nano-world to large scale wide area systems of systems. Key application areas include healthcare, transportation, energy, process control and robotics where intelligent decision support has key significance in establishing dynamic, ever-changing and high confidence future technologies. A recommended text for graduate students and researchers working on the applications of computational intelligence methods in CPS.

Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 – 26, 20

Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 - 26, 20
$246.98

This book constitutes the refereed proceedings of the 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008) held in Tokyo, Japan on September 24-26, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Digital Information and Communication Technology and Its Applications: International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings

Digital Information and Communication Technology and Its Applications: International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings
$240.88

This two-volume set CCIS 166 and CCIS 167constitutes the refereed proceedings of the International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2011, held in Dijon, France, in June 2010. The 128 revised full papers presented in both volumes were carefully reviewed and selected from330 submissions. The papers are organized in topical sections on Web applications; image processing; visual interfaces and user experience; network security; ad hoc network; cloud computing; Data Compression; Software Engineering; Networking and Mobiles; Distributed and Parallel processing; social networks; ontology; algorithms; multimedia; e-learning; interactive environments and emergent technologies for e-learning; signal processing; information and data management.

Data Mining and Knowledge Discovery Handbook

Data Mining and Knowledge Discovery Handbook
$234.69

Knowledge Discovery demonstrates intelligent computing at its best, and is the most desirable and interesting end-product of Information Technology. To be able to discover and to extract knowledge from data is a task that many researchers and practitioners are endeavoring to accomplish. There is a lot of hidden knowledge waiting to be discovered this is the challenge created by today s abundance of data. Data Mining and Knowledge Discovery Handbook, 2nd Edition organizes the most current concepts, theories, standards, methodologies, trends, challenges and applications of data mining (DM) and knowledge discovery in databases (KDD) into a coherent and unified repository. This handbook first surveys, then provides comprehensive yet concise algorithmic descriptions of methods, including classic methods plus the extensions and novel methods developed recently. This volume concludes with in-depth descriptions of data mining applications in various interdisciplinary industries including finance, marketing, medicine, biology, engineering, telecommunications, software, and security. Data Mining and Knowledge Discovery Handbook, 2nd Edition is designed for research scientists, libraries and advanced-level students in computer science and engineering as a reference. This handbook is also suitable for professionals in industry, for computing applications, information systems management, and strategic research management.

Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings

Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings
$229.79

This volume is the third part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 70 revised full papers presented in this volume were carefullyreviewed and selected from a large number of submissions. The papers are organized in topical sections on security, trust and privacy; sensor networks; signal and image processing; soft computing techniques; system software; vehicular communications networks.

Intelligence and Security Informatics for International Security: Information Sharing and Data Mining

Intelligence and Security Informatics for International Security: Information Sharing and Data Mining
$225.37

Reflects a decade of leading-edge research on intelligence and security informatics. Dr Chen is researcher at the Artificial Intelligence Laboratory and the NSF COPLINK Center for Homeland Security Information Technology Research. Describes real-world community situations. Targets wide-ranging audience: from researchers in computer science, information management and information science via analysts and policy makers in federal departments and national laboratories to consultants in IT hardware, communication, and software companies.

Embedded Software And Systems: Second International Conference, Icess 2005, Xi'an, China, December 16-18, 2005, Proceedings

Embedded Software And Systems: Second International Conference, Icess 2005, Xi'an, China, December 16-18, 2005, Proceedings
$222.89

This book constitutes the refereed proceedings of the Second International Conference on Embedded Software and Systems, ICESS 2005, held in Xi’an, China, in December 2005. The 63 revised full papers presented together with the abstracts of 3 keynote speeches were thoroughly reviewed and selected from 361 submissions. The papers are organized in topical sections on embedded hardware, embedded software, real-time systems, power aware computing, hardware/software co-design and system-on-chip, testing and verification, reconfigurable computing, agent and distributed computing, wireless communications, mobile computing, pervasive/ubiquitous computing and intelligence, multimedia and human-computer interaction, network protocol, security and fault-tolerance, and abstracts of eight selected workshop papers.

Intelligent Information Processing IV

Intelligent Information Processing IV
$218.70

This book constitutes the refereed proceedings of the 5th IFIP International Conference on Intelligent Information Processing held in Beijing, China on October 19-22, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Computer and Computing Technologies in Agriculture 2: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture, Ccta2008, October 18-20, 2008, Beijing, China

Computer and Computing Technologies in Agriculture 2: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture, Ccta2008, October 18-20, 2008, Beijing, China
$201.01

This book constitutes the refereed proceedings of the 2nd IFIP International Conference on Computer and Computing Technologies in Agriculture held in Beijing, China on October 18-20, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings

Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings
$198.52

This book constitutes the proceedings of the 15th European Symposium on Computer Security held in Athens, Greece in September 2010. The 42 papers included in the book were carefully reviewed and selected from 201 papers. The articles are organized in topical sections on RFID and Privacy, Software Security, Cryptographic Protocols, Traffic Analysis, End-User Security, Formal Analysis, E-voting and Broadcast, Authentication, Access Control, Authorization and Attestation, Anonymity and Unlinkability, Network Security and Economics, as well as Secure Update, DOS and Intrustion Detection.

Informatics Engineering and Information Science: International Conference, Icieis 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part II

Informatics Engineering and Information Science: International Conference, Icieis 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part II
$197.51

This 4-Volume-Set, CCIS 0251 – CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011.The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-learning, information security, software engineering, image processing, algorithms, artificial intelligence and soft computing, e-commerce, data mining, neural networks, social networks, grid computing, biometric technologies, networks, distributed and parallel computing, wireless networks, information and data management, web applications and software systems, multimedia, ad hoc networks, mobile computing, as well as miscellaneous topics in digital information and communications.

Virtual Community Building and the Information Society: Current and Future Directions

Virtual Community Building and the Information Society: Current and Future Directions
$195.00

Emergent technologies, including ambient intelligence and pervasive computing, promise a considerable advance in the way people use virtual communities, and new, innovative applications are making virtual communities more dynamic and usable than ever. Virtual Community Building and the Information Society: Current and Future Directions offers a holistic approach to virtual communities, providing relevant theoretical frameworks and presenting the latest empirical research on virtual technology, infrastructures, content modeling, knowledge modeling, content management, context awareness, mobility, security and trust. It also explores the social impact and applications of virtual communities, providing valuable insights for professionals, researchers, and managers in fields including information systems, computer science, knowledge management, software engineering, healthcare, business, information and communication sciences, education, and sociology who want to improve their understanding of the strategic role of virtual communities in the information society.

7th International Conference on Practical Applications of Agents and Multi-Agent Systems (Paams'09)

7th International Conference on Practical Applications of Agents and Multi-Agent Systems (Paams'09)
$519.00

PAAMS, the International Conference on Practical Applications of Agents and Multi-Agent Systems is an evolution of the International Workshop on Practical Applications of Agents and Multi-Agent Systems. PAAMS is an international yearly tribune to present, to discuss, and to disseminate the latest developments and the most important outcomes related to real-world applications. It provides a unique opportunity to bring multi-disciplinary experts, academics and practitioners together to exchange their experience in the development of Agents and Multi-Agent Systems. This volume presents the papers that have been accepted for the 2009 edition. These articles capture the most innovative results and this year’s trends: Assisted Cognition, E-Commerce, Grid Computing, Human Modelling, Information Systems, Knowledge Management, Agent-Based Simulation, Software Development, Transports, Trust and Security. Each paper has been reviewed by three different reviewers, from an international committee composed of 64 members from 20 different countries. From the 92 submissions received, 35 were selected for full presentation at the conference, and 26 were accepted as posters.

Mechatronics Engineering and Modern Information Technologies in Industrial Engineering: Selected, Peer Reviewed Papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (M

Mechatronics Engineering and Modern Information Technologies in Industrial Engineering: Selected, Peer Reviewed Papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (M
$466.67

Collection of selected, peer reviewed papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (MEMTIE 2014), October 25-26, 2014, Changsha, Hunan, China. The 664 papers are grouped as follows: Chapter 1: Applied Mechanics and Dynamics, Mechanical Engineering, Manufacturing; Chapter 2: Measurement and Instrumentation, Monitoring, Testing and Detection Technologies; Chapter 3: Mechatronics, Robotics, Automation and Control; Chapter 4: Electronics and Microelectronics, Embedded and Integrated Systems, Communications, Power and Energy, Electric and Magnetic Systems; Chapter 5: Numerical Methods, Computation Methods and Algorithms for Modeling, Simulation and Optimization, Data Mining and Data Processing; Chapter 6: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development; Chapter 7: Materials Engineering, Chemical Engineering and Materials Processing Technologies.

Computer and Computing Technologies in Agriculture II: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture Ccta2008, October 18-20, 2008, Beijing, China

Computer and Computing Technologies in Agriculture II: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture Ccta2008, October 18-20, 2008, Beijing, China
$327.28

This book constitutes the refereed proceedings of the 2nd IFIP International Conference on Computer and Computing Technologies in Agriculture held in Beijing, China on October 18-20, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Dependability Engineering and Complex Systems: Proceedings of the Eleventh International Conference on Dependability and Complex Systems Depcos-Relcom

Dependability Engineering and Complex Systems: Proceedings of the Eleventh International Conference on Dependability and Complex Systems Depcos-Relcom
$309.07

This proceedings present the results of the Eleventh International Conference on Dependability and Complex Systems DepCoS-RELCOMEX which took place in a picturesque Brunï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½w Palace in Poland from 27th June to 1st July, 2016. DepCoS-RELCOMEX is a series of international conferences organized annually by Department of Computer Engineering of Wrocï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½,aw University of Science and Technology since 2006. The roots of the series go as far back as to the seventies of the previous century – the first RELCOMEX conference took place in 1977 – and now its main aim is to promote a multi-disciplinary approach to dependability problems in theory and engineering practice of complex systems. Complex systems, nowadays most often computer-based and distributed, are built upon a variety of technical, information, software and human resources. The challenges in their design, analysis and maintenance not only originate from the involved technical and organizational structures but also from the complexity of the information processes that must be efficiently executed in a diverse, often hostile operational environment. Traditional methods of reliability evaluation focused only on technical resources are usually insufficient in this context and more innovative, multidisciplinary methods of dependability analysis must be applied. The diversity of the topics which need to be considered is well illustrated by the selection of the submissions in these proceedings with their subjects ranging from mathematical models and design methodologies through software engineering and data security issues up to practical problems in technical, e.g. transportation, and systems.

Ict and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II: Hosted by Csi Vishakapatnam Chapter

Ict and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II: Hosted by Csi Vishakapatnam Chapter
$271.70

This volume contains 85 papers presented at CSI 2013: 48th Annual Convention of Computer Society of India with the theme "ICT and Critical Infrastructure". The convention was held during 13th -15th December 2013 at Hotel Novotel Varun Beach, Visakhapatnam and hosted by Computer Society of India, Vishakhapatnam Chapter in association with Vishakhapatnam Steel Plant, the flagship company of RINL, India. This volume contains papers mainly focused on Data Mining, Data Engineering and Image Processing, Software Engineering and Bio-Informatics, Network Security, Digital Forensics and Cyber Crime, Internet and Multimedia Applications and E-Governance Applications.

New Technologies for Digital Crime and Forensics: Devices, Applications, and Software

New Technologies for Digital Crime and Forensics: Devices, Applications, and Software
$256.25

A must-have tutorial on browser hacking Web browsers are everywhere. Not just as gateways to businesses, but also on phones, in cars, on TVs, and even on the International Space Station. Imagine what this means if someone is able to hack those browsers. "The Browser Hacker’s Handbook" tackles the topic head-on. Written by a team of computer security experts, this in-depth book covers the many ways hackers gain access to browsers and lays out practical methods for attack and defense. It’s a solid, hands-on tutorial for IT and security consultants, or anyone responsible for computer security. Web browsers are rapidly becoming the operating systems of the world, and they have special vulnerabilities that hackers exploitThis unique book is a tutorial on browser hacking for anyone responsible for computer securityCovers how hackers attack the users, web, and intranets via browsersExplores a host of security and technology issues including SSL, spoofing, phishing, DNS tunneling, fingerprinting, malware, XSS, exploitation and moreBecome an ethical hacker, protect your browsers, and beat the bad guys at their own game with "The Browser Hacker’s Handbook."

Computational Intelligence for Decision Support in Cyber-Physical Systems (Studies in Computational Intelligence) (Hardcover)

Computational Intelligence for Decision Support in Cyber-Physical Systems (Studies in Computational Intelligence) (Hardcover)
$256.24

This book is dedicated to applied computational intelligence and soft computing techniques with special reference to decision support in Cyber Physical Systems (CPS), where the physical as well as the communication segment of the networked entities interact with each other. The joint dynamics of such systems result in a complex combination of computers, software, networks and physical processes all combined to establish a process flow at system level. This volume provides the audience with an in-depth vision about how to ensure dependability, safety, security and efficiency in real time by making use of computational intelligence in various CPS applications ranging from the nano-world to large scale wide area systems of systems. Key application areas include healthcare, transportation, energy, process control and robotics where intelligent decision support has key significance in establishing dynamic, ever-changing and high confidence future technologies. A recommended text for graduate students and researchers working on the applications of computational intelligence methods in CPS.

Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 – 26, 20

Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 - 26, 20
$246.98

This book constitutes the refereed proceedings of the 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008) held in Tokyo, Japan on September 24-26, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Digital Information and Communication Technology and Its Applications: International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings

Digital Information and Communication Technology and Its Applications: International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings
$240.88

This two-volume set CCIS 166 and CCIS 167constitutes the refereed proceedings of the International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2011, held in Dijon, France, in June 2010. The 128 revised full papers presented in both volumes were carefully reviewed and selected from330 submissions. The papers are organized in topical sections on Web applications; image processing; visual interfaces and user experience; network security; ad hoc network; cloud computing; Data Compression; Software Engineering; Networking and Mobiles; Distributed and Parallel processing; social networks; ontology; algorithms; multimedia; e-learning; interactive environments and emergent technologies for e-learning; signal processing; information and data management.

Data Mining and Knowledge Discovery Handbook

Data Mining and Knowledge Discovery Handbook
$234.69

Knowledge Discovery demonstrates intelligent computing at its best, and is the most desirable and interesting end-product of Information Technology. To be able to discover and to extract knowledge from data is a task that many researchers and practitioners are endeavoring to accomplish. There is a lot of hidden knowledge waiting to be discovered this is the challenge created by today s abundance of data. Data Mining and Knowledge Discovery Handbook, 2nd Edition organizes the most current concepts, theories, standards, methodologies, trends, challenges and applications of data mining (DM) and knowledge discovery in databases (KDD) into a coherent and unified repository. This handbook first surveys, then provides comprehensive yet concise algorithmic descriptions of methods, including classic methods plus the extensions and novel methods developed recently. This volume concludes with in-depth descriptions of data mining applications in various interdisciplinary industries including finance, marketing, medicine, biology, engineering, telecommunications, software, and security. Data Mining and Knowledge Discovery Handbook, 2nd Edition is designed for research scientists, libraries and advanced-level students in computer science and engineering as a reference. This handbook is also suitable for professionals in industry, for computing applications, information systems management, and strategic research management.

Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings

Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings
$229.79

This volume is the third part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 70 revised full papers presented in this volume were carefullyreviewed and selected from a large number of submissions. The papers are organized in topical sections on security, trust and privacy; sensor networks; signal and image processing; soft computing techniques; system software; vehicular communications networks.

Intelligence and Security Informatics for International Security: Information Sharing and Data Mining

Intelligence and Security Informatics for International Security: Information Sharing and Data Mining
$225.37

Reflects a decade of leading-edge research on intelligence and security informatics. Dr Chen is researcher at the Artificial Intelligence Laboratory and the NSF COPLINK Center for Homeland Security Information Technology Research. Describes real-world community situations. Targets wide-ranging audience: from researchers in computer science, information management and information science via analysts and policy makers in federal departments and national laboratories to consultants in IT hardware, communication, and software companies.

Embedded Software And Systems: Second International Conference, Icess 2005, Xi'an, China, December 16-18, 2005, Proceedings

Embedded Software And Systems: Second International Conference, Icess 2005, Xi'an, China, December 16-18, 2005, Proceedings
$222.89

This book constitutes the refereed proceedings of the Second International Conference on Embedded Software and Systems, ICESS 2005, held in Xi’an, China, in December 2005. The 63 revised full papers presented together with the abstracts of 3 keynote speeches were thoroughly reviewed and selected from 361 submissions. The papers are organized in topical sections on embedded hardware, embedded software, real-time systems, power aware computing, hardware/software co-design and system-on-chip, testing and verification, reconfigurable computing, agent and distributed computing, wireless communications, mobile computing, pervasive/ubiquitous computing and intelligence, multimedia and human-computer interaction, network protocol, security and fault-tolerance, and abstracts of eight selected workshop papers.

Intelligent Information Processing IV

Intelligent Information Processing IV
$218.70

This book constitutes the refereed proceedings of the 5th IFIP International Conference on Intelligent Information Processing held in Beijing, China on October 19-22, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Computer and Computing Technologies in Agriculture 2: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture, Ccta2008, October 18-20, 2008, Beijing, China

Computer and Computing Technologies in Agriculture 2: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture, Ccta2008, October 18-20, 2008, Beijing, China
$201.01

This book constitutes the refereed proceedings of the 2nd IFIP International Conference on Computer and Computing Technologies in Agriculture held in Beijing, China on October 18-20, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings

Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings
$198.52

This book constitutes the proceedings of the 15th European Symposium on Computer Security held in Athens, Greece in September 2010. The 42 papers included in the book were carefully reviewed and selected from 201 papers. The articles are organized in topical sections on RFID and Privacy, Software Security, Cryptographic Protocols, Traffic Analysis, End-User Security, Formal Analysis, E-voting and Broadcast, Authentication, Access Control, Authorization and Attestation, Anonymity and Unlinkability, Network Security and Economics, as well as Secure Update, DOS and Intrustion Detection.

Informatics Engineering and Information Science: International Conference, Icieis 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part II

Informatics Engineering and Information Science: International Conference, Icieis 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part II
$197.51

This 4-Volume-Set, CCIS 0251 – CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011.The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-learning, information security, software engineering, image processing, algorithms, artificial intelligence and soft computing, e-commerce, data mining, neural networks, social networks, grid computing, biometric technologies, networks, distributed and parallel computing, wireless networks, information and data management, web applications and software systems, multimedia, ad hoc networks, mobile computing, as well as miscellaneous topics in digital information and communications.

Virtual Community Building and the Information Society: Current and Future Directions

Virtual Community Building and the Information Society: Current and Future Directions
$195.00

Emergent technologies, including ambient intelligence and pervasive computing, promise a considerable advance in the way people use virtual communities, and new, innovative applications are making virtual communities more dynamic and usable than ever. Virtual Community Building and the Information Society: Current and Future Directions offers a holistic approach to virtual communities, providing relevant theoretical frameworks and presenting the latest empirical research on virtual technology, infrastructures, content modeling, knowledge modeling, content management, context awareness, mobility, security and trust. It also explores the social impact and applications of virtual communities, providing valuable insights for professionals, researchers, and managers in fields including information systems, computer science, knowledge management, software engineering, healthcare, business, information and communication sciences, education, and sociology who want to improve their understanding of the strategic role of virtual communities in the information society.

Pages:
1 2 3 4 5 6 7 8 9next pagelast page


7th International Conference on Practical Applications of Agents and Multi-Agent Systems (Paams'09)

7th International Conference on Practical Applications of Agents and Multi-Agent Systems (Paams'09)
$519.00

PAAMS, the International Conference on Practical Applications of Agents and Multi-Agent Systems is an evolution of the International Workshop on Practical Applications of Agents and Multi-Agent Systems. PAAMS is an international yearly tribune to present, to discuss, and to disseminate the latest developments and the most important outcomes related to real-world applications. It provides a unique opportunity to bring multi-disciplinary experts, academics and practitioners together to exchange their experience in the development of Agents and Multi-Agent Systems. This volume presents the papers that have been accepted for the 2009 edition. These articles capture the most innovative results and this year’s trends: Assisted Cognition, E-Commerce, Grid Computing, Human Modelling, Information Systems, Knowledge Management, Agent-Based Simulation, Software Development, Transports, Trust and Security. Each paper has been reviewed by three different reviewers, from an international committee composed of 64 members from 20 different countries. From the 92 submissions received, 35 were selected for full presentation at the conference, and 26 were accepted as posters.

Mechatronics Engineering and Modern Information Technologies in Industrial Engineering: Selected, Peer Reviewed Papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (M

Mechatronics Engineering and Modern Information Technologies in Industrial Engineering: Selected, Peer Reviewed Papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (M
$466.67

Collection of selected, peer reviewed papers from the 2014 International Conference on Mechatronics Engineering and Modern Technologies in Industrial Engineering (MEMTIE 2014), October 25-26, 2014, Changsha, Hunan, China. The 664 papers are grouped as follows: Chapter 1: Applied Mechanics and Dynamics, Mechanical Engineering, Manufacturing; Chapter 2: Measurement and Instrumentation, Monitoring, Testing and Detection Technologies; Chapter 3: Mechatronics, Robotics, Automation and Control; Chapter 4: Electronics and Microelectronics, Embedded and Integrated Systems, Communications, Power and Energy, Electric and Magnetic Systems; Chapter 5: Numerical Methods, Computation Methods and Algorithms for Modeling, Simulation and Optimization, Data Mining and Data Processing; Chapter 6: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development; Chapter 7: Materials Engineering, Chemical Engineering and Materials Processing Technologies.

Computer and Computing Technologies in Agriculture II: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture Ccta2008, October 18-20, 2008, Beijing, China

Computer and Computing Technologies in Agriculture II: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture Ccta2008, October 18-20, 2008, Beijing, China
$327.28

This book constitutes the refereed proceedings of the 2nd IFIP International Conference on Computer and Computing Technologies in Agriculture held in Beijing, China on October 18-20, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Dependability Engineering and Complex Systems: Proceedings of the Eleventh International Conference on Dependability and Complex Systems Depcos-Relcom

Dependability Engineering and Complex Systems: Proceedings of the Eleventh International Conference on Dependability and Complex Systems Depcos-Relcom
$309.07

This proceedings present the results of the Eleventh International Conference on Dependability and Complex Systems DepCoS-RELCOMEX which took place in a picturesque Brunï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½w Palace in Poland from 27th June to 1st July, 2016. DepCoS-RELCOMEX is a series of international conferences organized annually by Department of Computer Engineering of Wrocï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½ï ½,aw University of Science and Technology since 2006. The roots of the series go as far back as to the seventies of the previous century – the first RELCOMEX conference took place in 1977 – and now its main aim is to promote a multi-disciplinary approach to dependability problems in theory and engineering practice of complex systems. Complex systems, nowadays most often computer-based and distributed, are built upon a variety of technical, information, software and human resources. The challenges in their design, analysis and maintenance not only originate from the involved technical and organizational structures but also from the complexity of the information processes that must be efficiently executed in a diverse, often hostile operational environment. Traditional methods of reliability evaluation focused only on technical resources are usually insufficient in this context and more innovative, multidisciplinary methods of dependability analysis must be applied. The diversity of the topics which need to be considered is well illustrated by the selection of the submissions in these proceedings with their subjects ranging from mathematical models and design methodologies through software engineering and data security issues up to practical problems in technical, e.g. transportation, and systems.

Ict and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II: Hosted by Csi Vishakapatnam Chapter

Ict and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II: Hosted by Csi Vishakapatnam Chapter
$271.70

This volume contains 85 papers presented at CSI 2013: 48th Annual Convention of Computer Society of India with the theme "ICT and Critical Infrastructure". The convention was held during 13th -15th December 2013 at Hotel Novotel Varun Beach, Visakhapatnam and hosted by Computer Society of India, Vishakhapatnam Chapter in association with Vishakhapatnam Steel Plant, the flagship company of RINL, India. This volume contains papers mainly focused on Data Mining, Data Engineering and Image Processing, Software Engineering and Bio-Informatics, Network Security, Digital Forensics and Cyber Crime, Internet and Multimedia Applications and E-Governance Applications.

New Technologies for Digital Crime and Forensics: Devices, Applications, and Software

New Technologies for Digital Crime and Forensics: Devices, Applications, and Software
$256.25

A must-have tutorial on browser hacking Web browsers are everywhere. Not just as gateways to businesses, but also on phones, in cars, on TVs, and even on the International Space Station. Imagine what this means if someone is able to hack those browsers. "The Browser Hacker’s Handbook" tackles the topic head-on. Written by a team of computer security experts, this in-depth book covers the many ways hackers gain access to browsers and lays out practical methods for attack and defense. It’s a solid, hands-on tutorial for IT and security consultants, or anyone responsible for computer security. Web browsers are rapidly becoming the operating systems of the world, and they have special vulnerabilities that hackers exploitThis unique book is a tutorial on browser hacking for anyone responsible for computer securityCovers how hackers attack the users, web, and intranets via browsersExplores a host of security and technology issues including SSL, spoofing, phishing, DNS tunneling, fingerprinting, malware, XSS, exploitation and moreBecome an ethical hacker, protect your browsers, and beat the bad guys at their own game with "The Browser Hacker’s Handbook."

Computational Intelligence for Decision Support in Cyber-Physical Systems (Studies in Computational Intelligence) (Hardcover)

Computational Intelligence for Decision Support in Cyber-Physical Systems (Studies in Computational Intelligence) (Hardcover)
$256.24

This book is dedicated to applied computational intelligence and soft computing techniques with special reference to decision support in Cyber Physical Systems (CPS), where the physical as well as the communication segment of the networked entities interact with each other. The joint dynamics of such systems result in a complex combination of computers, software, networks and physical processes all combined to establish a process flow at system level. This volume provides the audience with an in-depth vision about how to ensure dependability, safety, security and efficiency in real time by making use of computational intelligence in various CPS applications ranging from the nano-world to large scale wide area systems of systems. Key application areas include healthcare, transportation, energy, process control and robotics where intelligent decision support has key significance in establishing dynamic, ever-changing and high confidence future technologies. A recommended text for graduate students and researchers working on the applications of computational intelligence methods in CPS.

Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 – 26, 20

Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 - 26, 20
$246.98

This book constitutes the refereed proceedings of the 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008) held in Tokyo, Japan on September 24-26, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Digital Information and Communication Technology and Its Applications: International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings

Digital Information and Communication Technology and Its Applications: International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings
$240.88

This two-volume set CCIS 166 and CCIS 167constitutes the refereed proceedings of the International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2011, held in Dijon, France, in June 2010. The 128 revised full papers presented in both volumes were carefully reviewed and selected from330 submissions. The papers are organized in topical sections on Web applications; image processing; visual interfaces and user experience; network security; ad hoc network; cloud computing; Data Compression; Software Engineering; Networking and Mobiles; Distributed and Parallel processing; social networks; ontology; algorithms; multimedia; e-learning; interactive environments and emergent technologies for e-learning; signal processing; information and data management.

Data Mining and Knowledge Discovery Handbook

Data Mining and Knowledge Discovery Handbook
$234.69

Knowledge Discovery demonstrates intelligent computing at its best, and is the most desirable and interesting end-product of Information Technology. To be able to discover and to extract knowledge from data is a task that many researchers and practitioners are endeavoring to accomplish. There is a lot of hidden knowledge waiting to be discovered this is the challenge created by today s abundance of data. Data Mining and Knowledge Discovery Handbook, 2nd Edition organizes the most current concepts, theories, standards, methodologies, trends, challenges and applications of data mining (DM) and knowledge discovery in databases (KDD) into a coherent and unified repository. This handbook first surveys, then provides comprehensive yet concise algorithmic descriptions of methods, including classic methods plus the extensions and novel methods developed recently. This volume concludes with in-depth descriptions of data mining applications in various interdisciplinary industries including finance, marketing, medicine, biology, engineering, telecommunications, software, and security. Data Mining and Knowledge Discovery Handbook, 2nd Edition is designed for research scientists, libraries and advanced-level students in computer science and engineering as a reference. This handbook is also suitable for professionals in industry, for computing applications, information systems management, and strategic research management.

Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings

Advances in Computing and Communications: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings
$229.79

This volume is the third part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 70 revised full papers presented in this volume were carefullyreviewed and selected from a large number of submissions. The papers are organized in topical sections on security, trust and privacy; sensor networks; signal and image processing; soft computing techniques; system software; vehicular communications networks.

Intelligence and Security Informatics for International Security: Information Sharing and Data Mining

Intelligence and Security Informatics for International Security: Information Sharing and Data Mining
$225.37

Reflects a decade of leading-edge research on intelligence and security informatics. Dr Chen is researcher at the Artificial Intelligence Laboratory and the NSF COPLINK Center for Homeland Security Information Technology Research. Describes real-world community situations. Targets wide-ranging audience: from researchers in computer science, information management and information science via analysts and policy makers in federal departments and national laboratories to consultants in IT hardware, communication, and software companies.

Embedded Software And Systems: Second International Conference, Icess 2005, Xi'an, China, December 16-18, 2005, Proceedings

Embedded Software And Systems: Second International Conference, Icess 2005, Xi'an, China, December 16-18, 2005, Proceedings
$222.89

This book constitutes the refereed proceedings of the Second International Conference on Embedded Software and Systems, ICESS 2005, held in Xi’an, China, in December 2005. The 63 revised full papers presented together with the abstracts of 3 keynote speeches were thoroughly reviewed and selected from 361 submissions. The papers are organized in topical sections on embedded hardware, embedded software, real-time systems, power aware computing, hardware/software co-design and system-on-chip, testing and verification, reconfigurable computing, agent and distributed computing, wireless communications, mobile computing, pervasive/ubiquitous computing and intelligence, multimedia and human-computer interaction, network protocol, security and fault-tolerance, and abstracts of eight selected workshop papers.

Intelligent Information Processing IV

Intelligent Information Processing IV
$218.70

This book constitutes the refereed proceedings of the 5th IFIP International Conference on Intelligent Information Processing held in Beijing, China on October 19-22, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Computer and Computing Technologies in Agriculture 2: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture, Ccta2008, October 18-20, 2008, Beijing, China

Computer and Computing Technologies in Agriculture 2: The Second Ifip International Conference on Computer and Computing Technologies in Agriculture, Ccta2008, October 18-20, 2008, Beijing, China
$201.01

This book constitutes the refereed proceedings of the 2nd IFIP International Conference on Computer and Computing Technologies in Agriculture held in Beijing, China on October 18-20, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings

Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings
$198.52

This book constitutes the proceedings of the 15th European Symposium on Computer Security held in Athens, Greece in September 2010. The 42 papers included in the book were carefully reviewed and selected from 201 papers. The articles are organized in topical sections on RFID and Privacy, Software Security, Cryptographic Protocols, Traffic Analysis, End-User Security, Formal Analysis, E-voting and Broadcast, Authentication, Access Control, Authorization and Attestation, Anonymity and Unlinkability, Network Security and Economics, as well as Secure Update, DOS and Intrustion Detection.

Informatics Engineering and Information Science: International Conference, Icieis 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part II

Informatics Engineering and Information Science: International Conference, Icieis 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part II
$197.51

This 4-Volume-Set, CCIS 0251 – CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011.The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-learning, information security, software engineering, image processing, algorithms, artificial intelligence and soft computing, e-commerce, data mining, neural networks, social networks, grid computing, biometric technologies, networks, distributed and parallel computing, wireless networks, information and data management, web applications and software systems, multimedia, ad hoc networks, mobile computing, as well as miscellaneous topics in digital information and communications.

Virtual Community Building and the Information Society: Current and Future Directions

Virtual Community Building and the Information Society: Current and Future Directions
$195.00

Emergent technologies, including ambient intelligence and pervasive computing, promise a considerable advance in the way people use virtual communities, and new, innovative applications are making virtual communities more dynamic and usable than ever. Virtual Community Building and the Information Society: Current and Future Directions offers a holistic approach to virtual communities, providing relevant theoretical frameworks and presenting the latest empirical research on virtual technology, infrastructures, content modeling, knowledge modeling, content management, context awareness, mobility, security and trust. It also explores the social impact and applications of virtual communities, providing valuable insights for professionals, researchers, and managers in fields including information systems, computer science, knowledge management, software engineering, healthcare, business, information and communication sciences, education, and sociology who want to improve their understanding of the strategic role of virtual communities in the information society.


Pages:
1 2 3 4 5 6 7 8 9next pagelast page