Filter
(found 3205 products)
Book cover image
Anne Dreller shows that data sharing offers great opportunities and huge value creation potential for the business world. Despite many opportunities that data sharing promises, the business world has not fully operationalized this fact yet, due to various existing challenges. Thus, an exemplary, future-oriented, and platform-based data sharing business model ...
Creating Value from Data Sharing: Future-oriented Business Models in Theory and Practice
Anne Dreller shows that data sharing offers great opportunities and huge value creation potential for the business world. Despite many opportunities that data sharing promises, the business world has not fully operationalized this fact yet, due to various existing challenges. Thus, an exemplary, future-oriented, and platform-based data sharing business model is developed for the startup Quemey. This business model is also equipped with prioritized implementation advice, including measures like focusing on strong values for all platform participants, growing their business into a powerful monopolist position, and eliminating barriers of technological, contractual and legal or data privacy uncertainties.
https://magrudy-assets.storage.googleapis.com/9783658232757.jpg
83.990000 USD

Creating Value from Data Sharing: Future-oriented Business Models in Theory and Practice

by Anne Dreller
Paperback / softback
Book cover image
This book constitutes the thoroughly refereed proceedings of the 18th International Conference on Transport Systems Telematics, TST 20187, held in Krakow, Poland in March 2018. The 36 full papers presented in this volume were carefully reviewed and selected from 128 submissions. They present and organize the knowledge from within the ...
Management Perspective for Transport Telematics: 18th International Conference on Transport System Telematics, TST 2018, Krakow, Poland, March 20-23, 2018, Selected Papers
This book constitutes the thoroughly refereed proceedings of the 18th International Conference on Transport Systems Telematics, TST 20187, held in Krakow, Poland in March 2018. The 36 full papers presented in this volume were carefully reviewed and selected from 128 submissions. They present and organize the knowledge from within the field of telematics in road transport, in rail transport, in marine transport, in air transport, in logistics.
https://magrudy-assets.storage.googleapis.com/9783319979540.jpg
115.490000 USD

Management Perspective for Transport Telematics: 18th International Conference on Transport System Telematics, TST 2018, Krakow, Poland, March 20-23, 2018, Selected Papers

Paperback / softback
Book cover image
This book constitutes the proceedings of the 24th International Conference on Principles and Practice of Constraint Programming, CP 2018, held in Lille, France, in August 2018.The 41 full and 9 short papers presented in this volume were carefully reviewed and selected from 114 submissions. They deal with all aspects of ...
Principles and Practice of Constraint Programming: 24th International Conference, CP 2018, Lille, France, August 27-31, 2018, Proceedings
This book constitutes the proceedings of the 24th International Conference on Principles and Practice of Constraint Programming, CP 2018, held in Lille, France, in August 2018.The 41 full and 9 short papers presented in this volume were carefully reviewed and selected from 114 submissions. They deal with all aspects of computing with constraints including theory, algorithms, environments, languages, models, systems, and applications such as decision making, resource allocation, scheduling, configuration, and planning. The papers were organized according to the following topics/tracks: main technical track; applications track; CP and data science; CP and music; CP and operations research; CP, optimization and power system management; multiagent and parallel CP; and testing and verification.
https://magrudy-assets.storage.googleapis.com/9783319983332.jpg
125.990000 USD

Principles and Practice of Constraint Programming: 24th International Conference, CP 2018, Lille, France, August 27-31, 2018, Proceedings

Paperback / softback
Book cover image
ADVANCES IN DIGITAL FORENSICS XIV Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. ...
Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers
ADVANCES IN DIGITAL FORENSICS XIV Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XIV describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues; Forensic Techniques; Network Forensics; Cloud Forensics; and Mobile and Embedded Device Forensics. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of nineteen edited papers from the Fourteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India in the winter of 2018. Advances in Digital Forensics XIV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson, Chair, IFIP WG 11.9 on Digital Forensics, is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.
https://magrudy-assets.storage.googleapis.com/9783319992761.jpg
125.990000 USD

Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers

Hardback
Book cover image
This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2018, held in Regensburg, Germany, in September 2018. The 19 revised full papers presented were carefully reviewed and selected from 22 submissions. The papers are organized in the following topical ...
Electronic Government and the Information Systems Perspective: 7th International Conference, EGOVIS 2018, Regensburg, Germany, September 3-5, 2018, Proceedings
This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2018, held in Regensburg, Germany, in September 2018. The 19 revised full papers presented were carefully reviewed and selected from 22 submissions. The papers are organized in the following topical sections: digitalization and transparency; challenges in e-government technology and e-voting; knowledge management in the context of e-government; semantic technologies and the legal aspects; open data and open innovation; and e-government cases - data and knowledge management.
https://magrudy-assets.storage.googleapis.com/9783319983486.jpg
73.490000 USD

Electronic Government and the Information Systems Perspective: 7th International Conference, EGOVIS 2018, Regensburg, Germany, September 3-5, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers ...
Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
https://magrudy-assets.storage.googleapis.com/9783319991351.jpg
104.990000 USD

Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings

Paperback / softback
Book cover image
Intelligence services, government administrations, businesses, and a growing majority of the population are hooked on the idea that big data can reveal patterns and correlations in everyday life. Initiated by software engineers and carried out through algorithms, the mining of big data has sparked a silent revolution. But algorithmic analysis ...
Data Love: The Seduction and Betrayal of Digital Technologies
Intelligence services, government administrations, businesses, and a growing majority of the population are hooked on the idea that big data can reveal patterns and correlations in everyday life. Initiated by software engineers and carried out through algorithms, the mining of big data has sparked a silent revolution. But algorithmic analysis and data mining are not simply byproducts of media development or the logical consequences of computation. They are the radicalization of the Enlightenment's quest for knowledge and progress. Data Love argues that the cold civil war of big data is taking place not among citizens or between the citizen and government but within each of us. Roberto Simanowski elaborates on the changes data love has brought to the human condition while exploring the entanglements of those who--out of stinginess, convenience, ignorance, narcissism, or passion--contribute to the amassing of ever more data about their lives, leading to the statistical evaluation and individual profiling of their selves. Writing from a philosophical standpoint, Simanowski illustrates the social implications of technological development and retrieves the concepts, events, and cultural artifacts of past centuries to help decode the programming of our present.
https://magrudy-assets.storage.googleapis.com/9780231177276.jpg
23.100000 USD

Data Love: The Seduction and Betrayal of Digital Technologies

by Roberto Simanowski
Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 15th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2018, held in Barcelona, Spain, in August 2018. The 15 full papers together with 2 short papers presented in this volume were carefully reviewed and selected from 50 submissions. The papers ...
Mobile Web and Intelligent Information Systems: 15th International Conference, MobiWIS 2018, Barcelona, Spain, August 6-8, 2018, Proceedings
This book constitutes the refereed proceedings of the 15th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2018, held in Barcelona, Spain, in August 2018. The 15 full papers together with 2 short papers presented in this volume were carefully reviewed and selected from 50 submissions. The papers of the MobiWIS 2018 deal with areas such as: mobile web and apps, wireless sensor networks, web services, cloud services, web applications, and various web technologies.
https://magrudy-assets.storage.googleapis.com/9783319971629.jpg
73.490000 USD

Mobile Web and Intelligent Information Systems: 15th International Conference, MobiWIS 2018, Barcelona, Spain, August 6-8, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the proceedings of the 22nd International Conference on Developments in Language Theory, DLT 2018, held in Tokyo, Japan, in September 2018. The 39 full papers presented in this volume were carefully reviewed and selected from 84 submissions. The papers cover the following topics and areas: combinatorial and ...
Developments in Language Theory: 22nd International Conference, DLT 2018, Tokyo, Japan, September 10-14, 2018, Proceedings
This book constitutes the proceedings of the 22nd International Conference on Developments in Language Theory, DLT 2018, held in Tokyo, Japan, in September 2018. The 39 full papers presented in this volume were carefully reviewed and selected from 84 submissions. The papers cover the following topics and areas: combinatorial and algebraic properties of words and languages; grammars, acceptors and transducers for strings, trees, graphics, arrays; algebraic theories for automata and languages; codes; efficient text algorithms; symbolic dynamics; decision problems; relationships to complexity theory and logic; picture description and analysis, polyominoes and bidimensional patterns; cryptography; concurrency; celluar automata; bio-inspired computing; quantum computing.
https://magrudy-assets.storage.googleapis.com/9783319986531.jpg
104.990000 USD

Developments in Language Theory: 22nd International Conference, DLT 2018, Tokyo, Japan, September 10-14, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the proceedings of the 10th IFIP WG 8.5 International Conference on Electronic Participation, ePart 2018, held in Krems, Austria, in September 2018. The 12 revised full papers presented in this book were carefully reviewed and selected from 29 submissions. The papers are clustered under the following topical ...
Electronic Participation: 10th IFIP WG 8.5 International Conference, ePart 2018, Krems, Austria, September 3-5, 2018, Proceedings
This book constitutes the proceedings of the 10th IFIP WG 8.5 International Conference on Electronic Participation, ePart 2018, held in Krems, Austria, in September 2018. The 12 revised full papers presented in this book were carefully reviewed and selected from 29 submissions. The papers are clustered under the following topical sections: general e-democracy and e-participation; digital collaboration and social media; policy modeling and policy informatics; and social innovation.
https://magrudy-assets.storage.googleapis.com/9783319985770.jpg
62.990000 USD

Electronic Participation: 10th IFIP WG 8.5 International Conference, ePart 2018, Krems, Austria, September 3-5, 2018, Proceedings

Paperback / softback
Book cover image
The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the ...
Compressed Sensing for Privacy-Preserving Data Processing
The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the topic by first establishing a shared knowledge about compressed sensing and how it is used nowadays. Then, clear models and definitions for its use as a cryptosystem and a privacy-preserving embedding are laid down, before tackling state-of-the-art results for both applications. The reader will conclude the book having learned that the current results in terms of security of compressed techniques allow it to be a very promising solution to many practical problems of interest. The book caters to a broad audience among researchers, scientists, or engineers with very diverse backgrounds, having interests in security, cryptography and privacy in information retrieval systems. Accompanying software is made available on the authors' website to reproduce the experiments and techniques presented in the book. The only background required to the reader is a good knowledge of linear algebra, probability and information theory.
https://magrudy-assets.storage.googleapis.com/9789811322785.jpg
73.490000 USD

Compressed Sensing for Privacy-Preserving Data Processing

by Enrico Magli, Tiziano Bianchi, Diego Valsesia, Matteo Testa
Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 11th International Symposium on Algorithmic Game Theory, SAGT 2018, held in Beijing, China, in September 2018. The 19 full papers presented together with 6 short papers and 5 plenary talks were carefully reviewed and selected from 54 submissions. The papers cover various ...
Algorithmic Game Theory: 11th International Symposium, SAGT 2018, Beijing, China, September 11-14, 2018, Proceedings
This book constitutes the refereed proceedings of the 11th International Symposium on Algorithmic Game Theory, SAGT 2018, held in Beijing, China, in September 2018. The 19 full papers presented together with 6 short papers and 5 plenary talks were carefully reviewed and selected from 54 submissions. The papers cover various important aspects of algorithmic game theory including market equilibrium, auctions and applications, two sided markets, cake-cutting, cooperative games, voting games, multi-agent scheduling, price of stability, various mechanism design problems: online-dynamics and multi-stages as well as revenue maximization and resource allocation and applications.
https://magrudy-assets.storage.googleapis.com/9783319996592.jpg
73.490000 USD

Algorithmic Game Theory: 11th International Symposium, SAGT 2018, Beijing, China, September 11-14, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 11th IFIP WG 11.8 World Conference on Information Security Education, WISE 11, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 11 revised papers presented were carefully reviewed and selected from 25 submissions. They ...
Information Security Education - Towards a Cybersecure Society: 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings
This book constitutes the refereed proceedings of the 11th IFIP WG 11.8 World Conference on Information Security Education, WISE 11, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 11 revised papers presented were carefully reviewed and selected from 25 submissions. They focus on cybersecurity and are organized in the following topical sections: information security learning techniques; information security training and awareness; and information security courses and curricula.
https://magrudy-assets.storage.googleapis.com/9783319997339.jpg
104.990000 USD

Information Security Education - Towards a Cybersecure Society: 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings

Hardback
Book cover image
This book constitutes the refereed proceedings of the 24th International Conference on DNA Computing and Molecular Programming, DNA 24, held in Jinan, China, in October 2018. The 12 full papers presented were carefully selected from 14 submissions. Research in DNA computing aims to draw together mathematics, computer science, physics, chemistry, ...
DNA Computing and Molecular Programming: 24th International Conference, DNA 24, Jinan, China, October 8-12, 2018, Proceedings
This book constitutes the refereed proceedings of the 24th International Conference on DNA Computing and Molecular Programming, DNA 24, held in Jinan, China, in October 2018. The 12 full papers presented were carefully selected from 14 submissions. Research in DNA computing aims to draw together mathematics, computer science, physics, chemistry, biology, and nanotechnology to address the analysis, design, and synthesis of information-based molecular systems. The papers were sought in all areas related to biomolecular computing, including: algorithms and models for computation on biomolecular systems; computational processes in vitro and in vivo; molecular switches, gates, devices, and circuits; molecular folding and self-assembly of nanostructures; analysis and theoretical models of laboratory techniques; molecular motors and molecular robotics; information storage; studies of fault tolerance and error correction; software tools for analysis, simulation, and design; synthetic biology and in vitro evolution; and applications in engineering, physics, chemistry, biology, and medicine.
https://magrudy-assets.storage.googleapis.com/9783030000295.jpg
62.990000 USD

DNA Computing and Molecular Programming: 24th International Conference, DNA 24, Jinan, China, October 8-12, 2018, Proceedings

Paperback / softback
Book cover image
The LNCS volume 10996 constitutes the proceedings of the 13th Chinese Conference on Biometric Recognition, held in Urumchi, China, in August 2018. The 79 full papers and 67 poster papers presented were carefully reviewed and selected from 112 submissions. The papers cover a wide range of topics such as Biometrics, ...
Biometric Recognition: 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedings
The LNCS volume 10996 constitutes the proceedings of the 13th Chinese Conference on Biometric Recognition, held in Urumchi, China, in August 2018. The 79 full papers and 67 poster papers presented were carefully reviewed and selected from 112 submissions. The papers cover a wide range of topics such as Biometrics, Speech recognition, Activity recognition and understanding, Online handwriting recognition, System forensics, Multi-factor authentication, Graphical and visual passwords.
https://magrudy-assets.storage.googleapis.com/9783319979083.jpg
115.490000 USD

Biometric Recognition: 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.The 30 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on signatures and watermarking; composability; ...
Security and Cryptography for Networks: 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings
This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.The 30 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on signatures and watermarking; composability; encryption; multiparty computation; anonymity and zero knowledge; secret sharing and oblivious transfer; lattices and post quantum cryptography; obfuscation; two-party computation; and protocols.
https://magrudy-assets.storage.googleapis.com/9783319981123.jpg
104.990000 USD

Security and Cryptography for Networks: 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings

Paperback / softback
Book cover image
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The ...
Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IV
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics
https://magrudy-assets.storage.googleapis.com/9783030000141.jpg
125.990000 USD

Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IV

Paperback / softback
Book cover image
This book constitutes the proceedings of the 17th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2018, held in Krems, Austria, in September 2018, in conjunction with the 10th International Conference on eParticipation, ePart 2018. The 22 revised full papers presented were carefully reviewed and selected from 48 submissions. ...
Electronic Government: 17th IFIP WG 8.5 International Conference, EGOV 2018, Krems, Austria, September 3-5, 2018, Proceedings
This book constitutes the proceedings of the 17th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2018, held in Krems, Austria, in September 2018, in conjunction with the 10th International Conference on eParticipation, ePart 2018. The 22 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are clustered under the following topical sections: General E-Government and Open Government; Open Data, Linked Data, and Semantic Web; Smart Governance (Government, Cities and Regions); and Artificial Intelligence, Data Analytics and Automated Decision-Making.
https://magrudy-assets.storage.googleapis.com/9783319986890.jpg
73.490000 USD

Electronic Government: 17th IFIP WG 8.5 International Conference, EGOV 2018, Krems, Austria, September 3-5, 2018, Proceedings

Paperback / softback
Book cover image
This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify ...
Introduction to Security Reduction
This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.
https://magrudy-assets.storage.googleapis.com/9783319930480.jpg
157.490000 USD

Introduction to Security Reduction

by Yi Mu, Willy Susilo, Fuchun Guo
Hardback
Book cover image
This book constitutes the refereed proceedings of the 14th World Congress on Services, SERVICES 2018, held as part of the Services Conference Federation, SCF 2018, in Seattle, USA, in June 2018. The 10 full papers and 3 short papers presented were carefully reviewed and selected from 22 submissions. The papers ...
Services - SERVICES 2018: 14th World Congress, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
This book constitutes the refereed proceedings of the 14th World Congress on Services, SERVICES 2018, held as part of the Services Conference Federation, SCF 2018, in Seattle, USA, in June 2018. The 10 full papers and 3 short papers presented were carefully reviewed and selected from 22 submissions. The papers cover topics in the field of software foundations and applications with a focus on novel approaches for engineering requirements, design and architectures, testing, maintenance and evolution, model-driven development, software processes, metrics, quality assurance and new software economics models, search-based software engineering, benefiting day-to-day services sectors and derived through experiences, with appreciation to scale, pragmatism, transparency, compliance and/or dependability.
https://magrudy-assets.storage.googleapis.com/9783319944715.jpg
62.990000 USD

Services - SERVICES 2018: 14th World Congress, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings

Paperback
Book cover image
This book constitutes the proceedings of the International Conference on Internet of Things, ICIOT 2018, held in Seattle, WA, USA, in June 2018. The 13 full papers and 1 short paper presented in this volume was carefully reviewed and selected for inclusion in this book. The contributions are organized in ...
Internet of Things - ICIOT 2018: Third International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
This book constitutes the proceedings of the International Conference on Internet of Things, ICIOT 2018, held in Seattle, WA, USA, in June 2018. The 13 full papers and 1 short paper presented in this volume was carefully reviewed and selected for inclusion in this book. The contributions are organized in topical sections named: Research Track - Architecture; Research Track - Smart IoT; Application and Industry Track; and Short Paper Track. They deal with research and application innovations in the internet of things services.
https://magrudy-assets.storage.googleapis.com/9783319943695.jpg
62.990000 USD

Internet of Things - ICIOT 2018: Third International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the revised selected papers of the scientific satellite events that were held in conjunction with the 15th International Conference on Service-Oriented Computing, ICSOC 2017, held in Malaga, Spain, in November 2017. The ICSOC 2017 workshop track consisted of three workshops on a wide range of topics that ...
Service-Oriented Computing - ICSOC 2017 Workshops: ASOCA, ISyCC, WESOACS, and Satellite Events, Malaga, Spain, November 13-16, 2017, Revised Selected Papers
This book constitutes the revised selected papers of the scientific satellite events that were held in conjunction with the 15th International Conference on Service-Oriented Computing, ICSOC 2017, held in Malaga, Spain, in November 2017. The ICSOC 2017 workshop track consisted of three workshops on a wide range of topics that fall into the general area of service computing: ASOCA 2017: The Second Workshop on Adaptive Service-Oriented and Cloud Applications ISyCC 2016: The Second Workshop on IoT Systems Provisioning and Management in Cloud Computing WESOACS 2017: The 13th International Workshop on Engineering Service-Oriented Applications and Cloud Services
https://magrudy-assets.storage.googleapis.com/9783319917634.jpg
83.990000 USD

Service-Oriented Computing - ICSOC 2017 Workshops: ASOCA, ISyCC, WESOACS, and Satellite Events, Malaga, Spain, November 13-16, 2017, Revised Selected Papers

Paperback / softback
Book cover image
This book explores cognitive behavior among Internet of Things. Using a series of current and futuristic examples - appliances, personal assistants, robots, driverless cars, customer care, engineering, monetization, and many more - the book covers use cases, technology and communication aspects of how machines will support individuals and organizations. This ...
Cognitive (Internet of) Things: Collaboration to Optimize Action
This book explores cognitive behavior among Internet of Things. Using a series of current and futuristic examples - appliances, personal assistants, robots, driverless cars, customer care, engineering, monetization, and many more - the book covers use cases, technology and communication aspects of how machines will support individuals and organizations. This book examines the Cognitive Things covering a number of important questions: * What are Cognitive Things? * What applications can be driven from Cognitive Things - today and tomorrow? * How will these Cognitive Things collaborate with each and other, with individuals and with organizations? * What is the cognitive era? How is it different from the automation era? * How will the Cognitive Things support or accelerate human problem solving? * Which technical components make up cognitive behavior? * How does it redistribute the work-load between humans and machines? * What types of data can be collected from them and shared with external organizations? * How do they recognize and authenticate authorized users? How is the data safeguarded from potential theft? Who owns the data and how are the data ownership rights enforced? Overall, Sathi explores ways in which Cognitive Things bring value to individuals as well as organizations and how to integrate the use of the devices into changing organizational structures. Case studies are used throughout to illustrate how innovators are already benefiting from the initial explosion of devices and data. Business executives, operational managers, and IT professionals will understand the fundamental changes required to fully benefit from cognitive technologies and how to utilize them for their own success.
https://magrudy-assets.storage.googleapis.com/9781349955336.jpg
41.990000 USD

Cognitive (Internet of) Things: Collaboration to Optimize Action

by Arvind Sathi
Paperback / softback
Book cover image
This book constitutes the proceedings of the 11th International Conference on Social, Cultural, and Behavioral Modeling, SBP-BRiMS 2018, held in Washington, DC, USA, in July 2018. The total of 27 short and 18 full papers presented in this volume was carefully reviewed and selected from 85 submissions. The contributions were ...
Social, Cultural, and Behavioral Modeling: 11th International Conference, SBP-BRiMS 2018, Washington, DC, USA, July 10-13, 2018, Proceedings
This book constitutes the proceedings of the 11th International Conference on Social, Cultural, and Behavioral Modeling, SBP-BRiMS 2018, held in Washington, DC, USA, in July 2018. The total of 27 short and 18 full papers presented in this volume was carefully reviewed and selected from 85 submissions. The contributions were organized in topical sections named: advances in sociocultural and behavioral process modeling; information, systems, and network science; applications for health and well-being; military and intelligence applications; cybersecurity.
https://magrudy-assets.storage.googleapis.com/9783319933719.jpg
83.990000 USD

Social, Cultural, and Behavioral Modeling: 11th International Conference, SBP-BRiMS 2018, Washington, DC, USA, July 10-13, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications ...
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.
https://magrudy-assets.storage.googleapis.com/9783319936376.jpg
125.990000 USD

Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic ...
Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.
https://magrudy-assets.storage.googleapis.com/9783319933863.jpg
115.490000 USD

Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings

Paperback / softback
Book cover image
This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, ...
Cryptology Transmitted Message Protection: From Deterministic Chaos up to Optical Vortices
This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, with nonlinearity playing a key evolving role. The proposed solutions allow the universal phenomenon of deterministic chaos to be discussed in the context of information security problems on the basis of examples of both electronic and optical systems. Further, the book presents the vortex detector and communication systems and describes mathematical models of the chaos oscillator as a coder in the synchronous chaotic communication and appropriate decoders, demonstrating their efficiency both analytically and experimentally. Lastly it discusses the cryptologic features of analyzed systems and suggests a series of new structures for confident communication.
https://magrudy-assets.storage.googleapis.com/9783319807287.jpg
167.990000 USD

Cryptology Transmitted Message Protection: From Deterministic Chaos up to Optical Vortices

by Sergey Smolskiy, Ilia Romanov, Boris Poizner, Igor Izmailov
Paperback / softback
Book cover image
This textbook covers the theoretical backgrounds and practical aspects of image, video and audio feature expression, e.g., color, texture, edge, shape, salient point and area, motion, 3D structure, audio/sound in time, frequency and cepstral domains, structure and melody. Up-to-date algorithms for estimation, search, classification and compact expression of feature data ...
Multimedia Content Analysis
This textbook covers the theoretical backgrounds and practical aspects of image, video and audio feature expression, e.g., color, texture, edge, shape, salient point and area, motion, 3D structure, audio/sound in time, frequency and cepstral domains, structure and melody. Up-to-date algorithms for estimation, search, classification and compact expression of feature data are described in detail. Concepts of signal decomposition (such as segmentation, source tracking and separation), as well as composition, mixing, effects, and rendering, are discussed. Numerous figures and examples help to illustrate the aspects covered. The book was developed on the basis of a graduate-level university course, and most chapters are supplemented by problem-solving exercises. The book is also a self-contained introduction both for researchers and developers of multimedia content analysis systems in industry.
https://magrudy-assets.storage.googleapis.com/9783662570852.jpg
188.990000 USD

Multimedia Content Analysis

by Jens-Rainer Ohm
Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 5th International Conference on HCI in Business, Government and Organizations, HCIBGO 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA. The 1171 full papers and 160 posters presented at the 14 co-located ...
HCI in Business, Government, and Organizations: 5th International Conference, HCIBGO 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings
This book constitutes the refereed proceedings of the 5th International Conference on HCI in Business, Government and Organizations, HCIBGO 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA. The 1171 full papers and 160 posters presented at the 14 co-located HCII 2018 conferences were carefully reviewed and selected from a total of 4346 submissions. The papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The papers included in this volume cover the following topics: information systems in business; electronic commerce and consumer behavior; social media and social communities in business; social innovation; and business analytics and visualization.
https://magrudy-assets.storage.googleapis.com/9783319917153.jpg
125.990000 USD

HCI in Business, Government, and Organizations: 5th International Conference, HCIBGO 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings

Paperback / softback
Book cover image
This book presents a comprehensive, structured, up-to-date survey on instruction selection. The survey is structured according to two dimensions: approaches to instruction selection from the past 45 years are organized and discussed according to their fundamental principles, and according to the characteristics of the supported machine instructions. The fundamental principles ...
Instruction Selection: Principles, Methods, and Applications
This book presents a comprehensive, structured, up-to-date survey on instruction selection. The survey is structured according to two dimensions: approaches to instruction selection from the past 45 years are organized and discussed according to their fundamental principles, and according to the characteristics of the supported machine instructions. The fundamental principles are macro expansion, tree covering, DAG covering, and graph covering. The machine instruction characteristics introduced are single-output, multi-output, disjoint-output, inter-block, and interdependent machine instructions. The survey also examines problems that have yet to be addressed by existing approaches. The book is suitable for advanced undergraduate students in computer science, graduate students, practitioners, and researchers.
https://magrudy-assets.storage.googleapis.com/9783319816586.jpg
52.490000 USD

Instruction Selection: Principles, Methods, and Applications

by Gabriel Hjort Blindell
Paperback / softback
Page 1 of 40