Filter
(found 3369 products)
Book cover image
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2018, which took place in Faro, Portugal, in September 2018. The 30 revised full and 16 workshop papers were carefully reviewed and selected from 68 submissions. The papers are thematically grouped ...
Broadband Communications, Networks, and Systems: 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19-20, 2018, Proceedings
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2018, which took place in Faro, Portugal, in September 2018. The 30 revised full and 16 workshop papers were carefully reviewed and selected from 68 submissions. The papers are thematically grouped as follows: Advanced Techniques for IoT and WSNs; SDN and Network Virtualization; eHealth and Telemedicine Mobile Applications; Security and Privacy Preservation; Communication Reliability and Protocols; Spatial Modulation Techniques; Hardware Implementation and Antenna Design.
https://magrudy-assets.storage.googleapis.com/9783030051945.jpg
99.750000 USD

Broadband Communications, Networks, and Systems: 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19-20, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information and Communication Technologies in Agriculture, Food and Environment, HAICTA 2017, held in Chania, Crete, Greece, in September 2017. The 14 revised full papers presented in this book were carefully selected from the 55 accepted full ...
Information and Communication Technologies in Modern Agricultural Development: 8th International Conference, HAICTA 2017, Chania, Crete, Greece, September 21-24, 2017, Revised Selected Papers
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information and Communication Technologies in Agriculture, Food and Environment, HAICTA 2017, held in Chania, Crete, Greece, in September 2017. The 14 revised full papers presented in this book were carefully selected from the 55 accepted full papers out of 124 submissions. The selected papers span across various subjects, from ICT innovations and smart farming, to decision support systems, as well as precision farming, disease diagnosis using mobile devices, IoT for monitoring and controlling animal production, sensor-based solutions, GIS-based water management, environmental planning, information systems for monitoring of fish stocks and fisheries, information management in the agri-food sector, and forestry planning and management.
https://magrudy-assets.storage.googleapis.com/9783030129972.jpg
89.240000 USD

Information and Communication Technologies in Modern Agricultural Development: 8th International Conference, HAICTA 2017, Chania, Crete, Greece, September 21-24, 2017, Revised Selected Papers

Paperback / softback
Book cover image
This book constitutes the proceedings of the Third International Conference on Space Information Networks, SINC 2018, held in Changchun, China, in August 2018. The 17 full and 7 short papers presented in this volume were carefully reviewed and selected from 140 submissions. The papers are organized in topical sections on ...
Space Information Networks: Third International Conference, SINC 2018, Changchun, China, August 9-10, 2018, Revised Selected Papers
This book constitutes the proceedings of the Third International Conference on Space Information Networks, SINC 2018, held in Changchun, China, in August 2018. The 17 full and 7 short papers presented in this volume were carefully reviewed and selected from 140 submissions. The papers are organized in topical sections on architecture and efficient networking mechanism; theories and methods of high speed transmission; and sparse characterization and fusion processing.
https://magrudy-assets.storage.googleapis.com/9789811359361.jpg
89.240000 USD

Space Information Networks: Third International Conference, SINC 2018, Changchun, China, August 9-10, 2018, Revised Selected Papers

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 47th Annual Conference of the Southern African Computer Lecturers' Association on ICT Education, SACLA 2018, held in Gordon's Bay, South Africa, in June 2018. The 23 revised full papers presented together with an extended abstract of a keynote paper were carefully reviewed ...
ICT Education: 47th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2018, Gordon's Bay, South Africa, June 18-20, 2018, Revised Selected Papers
This book constitutes the refereed proceedings of the 47th Annual Conference of the Southern African Computer Lecturers' Association on ICT Education, SACLA 2018, held in Gordon's Bay, South Africa, in June 2018. The 23 revised full papers presented together with an extended abstract of a keynote paper were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections: playfulness, media and classrooms, academia and careers, teaching programming, adaptation and learning, teamwork and projects, learning systems, topic teaching.
https://magrudy-assets.storage.googleapis.com/9783030058128.jpg
104.990000 USD

ICT Education: 47th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2018, Gordon's Bay, South Africa, June 18-20, 2018, Revised Selected Papers

Paperback / softback
Book cover image
A call to redirect the intellectual focus of information retrieval and science (IR&S) toward the phenomenon of technology-mediated experience. In this book, Sachi Arafat and Elham Ashoori issue a call to reorient the intellectual focus of information retrieval and science (IR&S) away from search and related processes toward the more ...
Search Foundations: Toward a Science of Technology-Mediated Experience
A call to redirect the intellectual focus of information retrieval and science (IR&S) toward the phenomenon of technology-mediated experience. In this book, Sachi Arafat and Elham Ashoori issue a call to reorient the intellectual focus of information retrieval and science (IR&S) away from search and related processes toward the more general phenomenon of technology-mediated experience. Technology-mediated experience accounts for an increasing proportion of human lived experience; the phenomenon of mediation gets at the heart of the human-machine relationship. Framing IR&S more broadly in this way generalizes its problems and perspectives, dovetailing them with those shared across disciplines dealing with socio-technical phenomena. This reorientation of IR&S requires imagining it as a new kind of science: a science of technology-mediated experience (STME). Arafat and Ashoori not only offer detailed analysis of the foundational concepts underlying IR&S and other technical disciplines but also boldly call for a radical, systematic appropriation of the sciences and humanities to create a better understanding of the human-technology relationship. Arafat and Ashoori discuss the notion of progress in IR&S and consider ideas of progress from the history and philosophy of science. They argue that progress in IR&S requires explicit linking between technical and nontechnical aspects of discourse. They develop a network of basic questions and present a discursive framework for addressing these questions. With this book, Arafat and Ashoori provide both a manifesto for the reimagining of their field and the foundations on which a reframed IR&S would rest.
https://magrudy-assets.storage.googleapis.com/9780262038591.jpg
85.31 USD

Search Foundations: Toward a Science of Technology-Mediated Experience

by Elham Ashoori, Sachi Arafat
Hardback
Book cover image
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2019, CT-RSA 2019, held in San Francisco, CA, USA, in March 2019. The 28 papers presented in this volume were carefully reviewed and selected from 75 submissions. CT-RSA is the track devoted to scientific papers on ...
Topics in Cryptology - CT-RSA 2019: The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2019, CT-RSA 2019, held in San Francisco, CA, USA, in March 2019. The 28 papers presented in this volume were carefully reviewed and selected from 75 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto- graphic protocols to primitives and their implementation security.
https://magrudy-assets.storage.googleapis.com/9783030126117.jpg
104.990000 USD

Topics in Cryptology - CT-RSA 2019: The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings

Paperback / softback
Book cover image
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss ...
Cyber-Physical Systems Security
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.
https://magrudy-assets.storage.googleapis.com/9783319989341.jpg
167.990000 USD

Cyber-Physical Systems Security

Hardback
Book cover image
This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks ...
Digital Forensics and Watermarking: 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings
This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection.
https://magrudy-assets.storage.googleapis.com/9783030113889.jpg
83.990000 USD

Digital Forensics and Watermarking: 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings

Paperback / softback
Book cover image
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical ...
Cybercryptography: Applicable Cryptography for Cyberspace Security
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.
https://magrudy-assets.storage.googleapis.com/9783319725345.jpg
157.490000 USD

Cybercryptography: Applicable Cryptography for Cyberspace Security

by Song Y. Yan
Hardback
Book cover image
This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on the Arithmetic of Finite Field, WAIFI 2018, held in Bergen, Norway, in June 2018. The 14 revised full papers and six invited talks presented were carefully reviewed and selected from 26 submissions. The papers are organized ...
Arithmetic of Finite Fields: 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers
This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on the Arithmetic of Finite Field, WAIFI 2018, held in Bergen, Norway, in June 2018. The 14 revised full papers and six invited talks presented were carefully reviewed and selected from 26 submissions. The papers are organized in topical sections on invited talks; elliptic curves; hardware implementations; arithmetic and applications of finite fields and cryptography.
https://magrudy-assets.storage.googleapis.com/9783030051525.jpg
73.490000 USD

Arithmetic of Finite Fields: 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers

Paperback / softback
Book cover image
The book constitutes the refereed proceedings of the 13th EAI International Conference on Communications and Networking, held in October 2018 in Chengdu, China. The 71 papers presented were carefully selected from 114 submissions. The papers are organized in topical sections on wireless communications and networking, next generation WLAN, big data ...
Communications and Networking: 13th EAI International Conference, ChinaCom 2018, Chengdu, China, October 23-25, 2018, Proceedings
The book constitutes the refereed proceedings of the 13th EAI International Conference on Communications and Networking, held in October 2018 in Chengdu, China. The 71 papers presented were carefully selected from 114 submissions. The papers are organized in topical sections on wireless communications and networking, next generation WLAN, big data networks, cloud communications and networking, ad hoc and sensor networks, satellite and space communications and networking, optical communications and networking, information and coding theory, multimedia communications and smart networking, green communications and computing, signal processing for communications, network and information security, machine-to-machine and IoT, communication QoS, reliability and modeling, cognitive radio and networks, smart internet of things modeling, pattern recognition and image signal processing, digital audio and video signal processing, antenna and microwave communications, radar imaging and target recognition, and video coding and image signal processing.
https://magrudy-assets.storage.googleapis.com/9783030061609.jpg
137.550000 USD

Communications and Networking: 13th EAI International Conference, ChinaCom 2018, Chengdu, China, October 23-25, 2018, Proceedings

Paperback / softback
Book cover image
This book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. The book also offers detailed ...
Inside Radio: An Attack and Defense Guide
This book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. The book also offers detailed case studies and theoretical treatments - specifically it lists numerous laboratory procedures, results, plots, commands and screenshots from real-world experiments. It is a valuable reference guide for practitioners and researchers who want to learn more about the advanced research findings and use the off-the-shelf tools to explore the wireless world.
https://magrudy-assets.storage.googleapis.com/9789811341533.jpg
62.990000 USD

Inside Radio: An Attack and Defense Guide

by Lin Huang, Qing Yang
Paperback / softback
Book cover image
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management systems. After a short chapter that explains the context and objectives ...
Modelling and Verification of Secure Exams
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management systems. After a short chapter that explains the context and objectives of the book, in Chap. 2 the author introduces terminology for exams and the foundations required to formulate their security requirements. He describes the tasks that occur during an exam, taking account of the levels of detail and abstraction of an exam specification and the threats that arise out of the different exam roles. He also presents a taxonomy that classifies exams by types and categories. Chapter 3 contains formal definitions of the authentication, privacy, and verifiability requirements for exams, a framework based on the applied pi-calculus for the specification of authentication and privacy, and a more abstract approach based on set-theory that enables the specification of verifiability. Chapter 4 describes the Huszti-Petho protocol in detail and proposes a security enhancement. In Chap. 5 the author details Remark!, a protocol for Internet-based exams, discussing its cryptographic building blocks and some security considerations. Chapter 6 focuses on WATA, a family of computer-assisted exams that employ computer assistance while keeping face-to-face testing. The chapter also introduces formal definitions of accountability requirements and details the analysis of a WATA protocol against such definitions. In Chaps. 4, 5, and 6 the author uses the cryptographic protocol verifier ProVerif for the formal analyses. Finally, the author outlines future work in Chap. 7. The book is valuable for researchers and graduate students in the areas of information security, in particular for people engaged with exams or protocols.
https://magrudy-assets.storage.googleapis.com/9783030097899.jpg
94.490000 USD

Modelling and Verification of Secure Exams

by Rosario Giustolisi
Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, ...
E-Business and Telecommunications: 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper
This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 17 full papers presented were carefully reviewed and selected from 195 submissions. The papers cover the following key areas of information and communication technologies, including data communication and networking, e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems.
https://magrudy-assets.storage.googleapis.com/9783030110383.jpg
104.990000 USD

E-Business and Telecommunications: 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper

Paperback / softback
Book cover image
This book presents the state-of-the-art work in terms of searchable storage in cloud computing. It introduces and presents new schemes for exploring and exploiting the searchable storage via cost-efficient semantic hashing computation. Specifically, the contents in this book include basic hashing structures (Bloom filters, locality sensitive hashing, cuckoo hashing), semantic ...
Searchable Storage in Cloud Computing
This book presents the state-of-the-art work in terms of searchable storage in cloud computing. It introduces and presents new schemes for exploring and exploiting the searchable storage via cost-efficient semantic hashing computation. Specifically, the contents in this book include basic hashing structures (Bloom filters, locality sensitive hashing, cuckoo hashing), semantic storage systems, and searchable namespace, which support multiple applications, such as cloud backups, exact and approximate queries and image analytics. Readers would be interested in the searchable techniques due to the ease of use and simplicity. More importantly, all these mentioned structures and techniques have been really implemented to support real-world applications, some of which offer open-source codes for public use. Readers will obtain solid backgrounds, new insights and implementation experiences with basic knowledge in data structure and computer systems.
https://magrudy-assets.storage.googleapis.com/9789811327209.jpg
157.490000 USD

Searchable Storage in Cloud Computing

by Xue Liu, Yu Hua
Hardback
Book cover image
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. ...
Advances in Cyber Security: Principles, Techniques, and Applications
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes. Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.
https://magrudy-assets.storage.googleapis.com/9789811314827.jpg
157.490000 USD

Advances in Cyber Security: Principles, Techniques, and Applications

Hardback
Book cover image
The LNCS journal Transactions on Rough Sets is devoted to the entire spectrum of rough sets related issues, from logical and mathematical foundations, through all aspects of rough set theory and its applications, such as data mining, knowledge discovery, and intelligent information processing, to relations between rough sets and other ...
Transactions on Rough Sets XXI
The LNCS journal Transactions on Rough Sets is devoted to the entire spectrum of rough sets related issues, from logical and mathematical foundations, through all aspects of rough set theory and its applications, such as data mining, knowledge discovery, and intelligent information processing, to relations between rough sets and other approaches to uncertainty, vagueness, and incompleteness, such as fuzzy sets and theory of evidence. Volume XXI in the series is a continuation of a number of research streams that have grown out of the seminal work of Zdzislaw Pawlak during the first decade of the 21st century.
https://magrudy-assets.storage.googleapis.com/9783662587676.jpg
115.490000 USD

Transactions on Rough Sets XXI

Paperback / softback
Book cover image
This book constitutes the refereed post-conference proceedings of the 23rd Iberoamerican Congress on Pattern Recognition, CIARP 2018, held in Madrid, Spain, in November 2018 The 112 papers presented were carefully reviewed and selected from 187 submissions The program was comprised of 6 oral sessions on the following topics: machine learning, ...
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications: 23rd Iberoamerican Congress, CIARP 2018, Madrid, Spain, November 19-22, 2018, Proceedings
This book constitutes the refereed post-conference proceedings of the 23rd Iberoamerican Congress on Pattern Recognition, CIARP 2018, held in Madrid, Spain, in November 2018 The 112 papers presented were carefully reviewed and selected from 187 submissions The program was comprised of 6 oral sessions on the following topics: machine learning, computer vision, classification, biometrics and medical applications, and brain signals, and also on: text and character analysis, human interaction, and sentiment analysis
https://magrudy-assets.storage.googleapis.com/9783030134686.jpg
146.990000 USD

Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications: 23rd Iberoamerican Congress, CIARP 2018, Madrid, Spain, November 19-22, 2018, Proceedings

Paperback / softback
Book cover image
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections ...
Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security.
https://magrudy-assets.storage.googleapis.com/9783030017002.jpg
112.350000 USD

Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I

Paperback / softback
Book cover image
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not ...
Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.
https://magrudy-assets.storage.googleapis.com/9789811353093.jpg
167.990000 USD

Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project

Paperback / softback
Book cover image
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections ...
Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security.
https://magrudy-assets.storage.googleapis.com/9783030017033.jpg
112.350000 USD

Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II

Paperback / softback
Book cover image
This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018. The total of 21 papers presented in this volume were carefully reviewed and selected from 49 submissions. The papers were organized in topical sections ...
Information Security and Cryptology - ICISC 2018: 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers
This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018. The total of 21 papers presented in this volume were carefully reviewed and selected from 49 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.
https://magrudy-assets.storage.googleapis.com/9783030121457.jpg
83.990000 USD

Information Security and Cryptology - ICISC 2018: 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers

Paperback / softback
Book cover image
This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018. The 31 full papers presented together with 5 short papers and 1 invited paper were carefully reviewed and selected from 93 submissions. The papers cover ...
Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers
This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018. The 31 full papers presented together with 5 short papers and 1 invited paper were carefully reviewed and selected from 93 submissions. The papers cover topics in the field of blockchain and crypto currency; lattice-based cryptology; symmetric cryptology; applied cryptography; information security; assymetric encryption; and foundations.
https://magrudy-assets.storage.googleapis.com/9783030142339.jpg
94.490000 USD

Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers

Paperback / softback
Book cover image
Stay updated with expert techniques for solving data analytics and machine learning challenges and gain insights from complex projects and power up your applications Key Features Build independent machine learning (ML) systems leveraging the best features of R 3.5 Understand and apply different machine learning techniques using real-world examples Use ...
Mastering Machine Learning with R: Advanced machine learning techniques for building smart applications with R 3.5, 3rd Edition
Stay updated with expert techniques for solving data analytics and machine learning challenges and gain insights from complex projects and power up your applications Key Features Build independent machine learning (ML) systems leveraging the best features of R 3.5 Understand and apply different machine learning techniques using real-world examples Use methods such as multi-class classification, regression, and clustering Book DescriptionGiven the growing popularity of the R-zerocost statistical programming environment, there has never been a better time to start applying ML to your data. This book will teach you advanced techniques in ML ,using? the latest code in R 3.5. You will delve into various complex features of supervised learning, unsupervised learning, and reinforcement learning algorithms to design efficient and powerful ML models. This newly updated edition is packed with fresh examples covering a range of tasks from different domains. Mastering Machine Learning with R starts by showing you how to quickly manipulate data and prepare it for analysis. You will explore simple and complex models and understand how to compare them. You'll also learn to use the latest library support, such as TensorFlow and Keras-R, for performing advanced computations. Additionally, you'll explore complex topics, such as natural language processing (NLP), time series analysis, and clustering, which will further refine your skills in developing applications. Each chapter will help you implement advanced ML algorithms using real-world examples. You'll even be introduced to reinforcement learning, along with its various use cases and models. In the concluding chapters, you'll get a glimpse into how some of these blackbox models can be diagnosed and understood. By the end of this book, you'll be equipped with the skills to deploy ML techniques in your own projects or at work. What you will learn Prepare data for machine learning methods with ease Understand how to write production-ready code and package it for use Produce simple and effective data visualizations for improved insights Master advanced methods, such as Boosted Trees and deep neural networks Use natural language processing to extract insights in relation to text Implement tree-based classifiers, including Random Forest and Boosted Tree Who this book is forThis book is for data science professionals, machine learning engineers, or anyone who is looking for the ideal guide to help them implement advanced machine learning algorithms. The book will help you take your skills to the next level and advance further in this field. Working knowledge of machine learning with R is mandatory.
https://magrudy-assets.storage.googleapis.com/9781789618006.jpg
41.990000 USD

Mastering Machine Learning with R: Advanced machine learning techniques for building smart applications with R 3.5, 3rd Edition

by Cory Lesmeister
Paperback / softback
Book cover image
This open access book is about public open spaces, about people, and about the relationship between them and the role of technology in this relationship. It is about different approaches, methods, empirical studies, and concerns about a phenomenon that is increasingly being in the centre of sciences and strategies - ...
CyberParks - The Interface Between People, Places and Technology: New Approaches and Perspectives
This open access book is about public open spaces, about people, and about the relationship between them and the role of technology in this relationship. It is about different approaches, methods, empirical studies, and concerns about a phenomenon that is increasingly being in the centre of sciences and strategies - the penetration of digital technologies in the urban space. As the main outcome of the CyberParks Project, this book aims at fostering the understanding about the current and future interactions of the nexus people, public spaces and technology. It addresses a wide range of challenges and multidisciplinary perspectives on emerging phenomena related to the penetration of technology in people's lifestyles - affecting therefore the whole society, and with this, the production and use of public spaces. Cyberparks coined the term cyberpark to describe the mediated public space, that emerging type of urban spaces where nature and cybertechnologies blend together to generate hybrid experiences and enhance quality of life.
https://magrudy-assets.storage.googleapis.com/9783030134167.jpg
62.990000 USD

CyberParks - The Interface Between People, Places and Technology: New Approaches and Perspectives

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 5th Conference on AElectronic Governance and Open Society: Challenges in Eurasia, EGOSE 2018, held in St. Petersburg, Russia, in November 2018. The 36 revised full papers were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections on ...
Electronic Governance and Open Society: Challenges in Eurasia: 5th International Conference, EGOSE 2018, St. Petersburg, Russia, November 14-16, 2018, Revised Selected Papers
This book constitutes the refereed proceedings of the 5th Conference on AElectronic Governance and Open Society: Challenges in Eurasia, EGOSE 2018, held in St. Petersburg, Russia, in November 2018. The 36 revised full papers were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections on smart city infrastructure, policy; digital privacy, rights,security;data science, machine learning, algorithms, computational linguistics; digital public administration, economy, policy; digital services, values, inclusion; digital democracy, participation, security, communities, social media, activism; social media discourse analysis; digital data, policy modeling; digital government, administration, communication.
https://magrudy-assets.storage.googleapis.com/9783030132828.jpg
83.990000 USD

Electronic Governance and Open Society: Challenges in Eurasia: 5th International Conference, EGOSE 2018, St. Petersburg, Russia, November 14-16, 2018, Revised Selected Papers

Paperback / softback
Book cover image
How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing. Creating Info We Trust is a craft that puts the world into forms that ...
Info We Trust: How to Inspire the World with Data
How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing. Creating Info We Trust is a craft that puts the world into forms that are strong and true. It begins with maps, diagrams, and charts -- but must push further than dry defaults to be truly effective. How do we attract attention? How can we offer audiences valuable experiences worth their time? How can we help people access complexity? Dark and mysterious, but full of potential, data is the raw material from which new understanding can emerge. Become a hero of the information age as you learn how to dip into the chaos of data and emerge with new understanding that can entertain, improve, and inspire. Whether you call the craft data storytelling, data visualization, data journalism, dashboard design, or infographic creation -- what matters is that you are courageously confronting the chaos of it all in order to improve how people see the world. Info We Trust is written for everyone who straddles the domains of data and people: data visualization professionals, analysts, and all who are enthusiastic for seeing the world in new ways. This book draws from the entirety of human experience, quantitative and poetic. It teaches advanced techniques, such as visual metaphor and data transformations, in order to create more human presentations of data. It also shows how we can learn from print advertising, engineering, museum curation, and mythology archetypes. This human-centered approach works with machines to design information for people. Advance your understanding beyond by learning from a broad tradition of putting things in formation to create new and wonderful ways of opening our eyes to the world. Info We Trust takes a thoroughly original point of attack on the art of informing. It builds on decades of best practices and adds the creative enthusiasm of a world-class data storyteller. Info We Trust is lavishly illustrated with hundreds of original compositions designed to illuminate the craft, delight the reader, and inspire a generation of data storytellers.
https://magrudy-assets.storage.googleapis.com/9781119483892.jpg
52.88 USD

Info We Trust: How to Inspire the World with Data

by Rj Andrews
Hardback
Book cover image
This open access book begins with an algorithm-a set of IF...THEN rules used in the development of a new, ethical, video surveillance architecture for transport hubs. Readers are invited to follow the algorithm over three years, charting its everyday life. Questions of ethics, transparency, accountability and market value must be ...
The Everyday Life of an Algorithm
This open access book begins with an algorithm-a set of IF...THEN rules used in the development of a new, ethical, video surveillance architecture for transport hubs. Readers are invited to follow the algorithm over three years, charting its everyday life. Questions of ethics, transparency, accountability and market value must be grasped by the algorithm in a series of ever more demanding forms of experimentation. Here the algorithm must prove its ability to get a grip on everyday life if it is to become an ordinary feature of the settings where it is being put to work. Through investigating the everyday life of the algorithm, the book opens a conversation with existing social science research that tends to focus on the power and opacity of algorithms. In this book we have unique access to the algorithm's design, development and testing, but can also bear witness to its fragility and dependency on others.
https://magrudy-assets.storage.googleapis.com/9783030005771.jpg
62.990000 USD

The Everyday Life of an Algorithm

by Daniel Neyland
Hardback
Book cover image
The fifth volume of Rudolf Ahlswede's lectures on Information Theory focuses on several problems that were at the heart of a lot of his research. One of the highlights of the entire lecture note series is surely Part I of this volume on arbitrarily varying channels (AVC), a subject in ...
Probabilistic Methods and Distributed Information: Rudolf Ahlswede's Lectures on Information Theory 5
The fifth volume of Rudolf Ahlswede's lectures on Information Theory focuses on several problems that were at the heart of a lot of his research. One of the highlights of the entire lecture note series is surely Part I of this volume on arbitrarily varying channels (AVC), a subject in which Ahlswede was probably the world's leading expert. Appended to Part I is a survey by Holger Boche and Ahmed Mansour on recent results concerning AVC and arbitrarily varying wiretap channels (AVWC). After a short Part II on continuous data compression, Part III, the longest part of the book, is devoted to distributed information. This Part includes discussions on a variety of related topics; among them let us emphasize two which are famously associated with Ahlswede: multiple descriptions , on which he produced some of the best research worldwide, and network coding , which had Ahlswede among the authors of its pioneering paper. The final Part IV on Statistical Inference under Communication constraints is mainly based on Ahlswede's joint paper with Imre Csiszar, which received the Best Paper Award of the IEEE Information Theory Society. The lectures presented in this work, which consists of 10 volumes, are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used either as the basis for courses or to supplement them in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs.
https://magrudy-assets.storage.googleapis.com/9783030003104.jpg
157.490000 USD

Probabilistic Methods and Distributed Information: Rudolf Ahlswede's Lectures on Information Theory 5

by Rudolf Ahlswede
Hardback
Book cover image
This book constitutes the refereed proceedings of the 10th International Development Informatics Association Conference, IDIA 2018, held in Tshwane, South Africa, in August 2018. The 20 revised full papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on ICT adoption and impact; ...
Locally Relevant ICT Research: 10th International Development Informatics Association Conference, IDIA 2018, Tshwane, South Africa, August 23-24, 2018, Revised Selected Papers
This book constitutes the refereed proceedings of the 10th International Development Informatics Association Conference, IDIA 2018, held in Tshwane, South Africa, in August 2018. The 20 revised full papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on ICT adoption and impact; mobile education; e-education; community development; design; innovation and maturity; data.
https://magrudy-assets.storage.googleapis.com/9783030112349.jpg
104.990000 USD

Locally Relevant ICT Research: 10th International Development Informatics Association Conference, IDIA 2018, Tshwane, South Africa, August 23-24, 2018, Revised Selected Papers

Paperback / softback
Page 1 of 40