Filter
(found 13294 products)
Book cover image
This book constitutes the refereed post-conference proceedings of the 48th International Simulation and Gaming Association Conference, ISAGA 2018, held in Delft, The Netherlands, in July 2018. The 19 revised full papers included in the volume were carefully reviewed and selected from 27 submissions. The contributions to this book range from ...
Simulation Gaming. Applications for Sustainable Cities and Smart Infrastructures: 48th International Simulation and Gaming Association Conference, ISAGA 2017, Delft, The Netherlands, July 10-14, 2017, Revised Selected Papers
This book constitutes the refereed post-conference proceedings of the 48th International Simulation and Gaming Association Conference, ISAGA 2018, held in Delft, The Netherlands, in July 2018. The 19 revised full papers included in the volume were carefully reviewed and selected from 27 submissions. The contributions to this book range from design thinking related to simulation gaming, the analysis of the consequences of design choices in games, to games for decision making, examples of games for business, climate change, maritime spatial planning, sustainable city development, supply chain, and much more.
https://magrudy-assets.storage.googleapis.com/9783319919010.jpg
62.990000 USD

Simulation Gaming. Applications for Sustainable Cities and Smart Infrastructures: 48th International Simulation and Gaming Association Conference, ISAGA 2017, Delft, The Netherlands, July 10-14, 2017, Revised Selected Papers

Paperback
Book cover image
This book constitutes the proceedings of the 16th International Conference on Smart Homes and Health Telematics, ICOST 2018, held in Singapore, Singapore, in July 2018. The theme of this year volume is Designing a better Future: Urban Assisted Living , focusing on quality of life of dependent people not only ...
Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living: 16th International Conference, ICOST 2018, Singapore, Singapore, July 10-12, 2018, Proceedings
This book constitutes the proceedings of the 16th International Conference on Smart Homes and Health Telematics, ICOST 2018, held in Singapore, Singapore, in July 2018. The theme of this year volume is Designing a better Future: Urban Assisted Living , focusing on quality of life of dependent people not only in their homes, but also in outdoor living environment to improve mobility and social interaction in the city. The 21 regular papers and 11 short papers included in this volume focus on research in the design, development, deployment and evaluation of smart urban environments, assistive technologies, chronic disease management, coaching and health telematics systems.
https://magrudy-assets.storage.googleapis.com/9783319945224.jpg
83.990000 USD

Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living: 16th International Conference, ICOST 2018, Singapore, Singapore, July 10-12, 2018, Proceedings

Paperback
Book cover image
This book constitutes the proceedings of the International Conference on Artificial Intelligence and Mobile Services, AIMS 2018, held as part of SCF 2018, in Seattle, WA, USA, in June 2018. The 20 papers presented in this volume were carefully reviewed and selected from numerous submissions. The papers cover different aspects ...
Artificial Intelligence and Mobile Services - AIMS 2018: 7th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
This book constitutes the proceedings of the International Conference on Artificial Intelligence and Mobile Services, AIMS 2018, held as part of SCF 2018, in Seattle, WA, USA, in June 2018. The 20 papers presented in this volume were carefully reviewed and selected from numerous submissions. The papers cover different aspects of mobile services from business management to computing systems, algorithms and applications. They promote technological technological innovations in research and development of mobile services, including, but not limited to, wireless and sensor networks, mobile and wearable computing, mobile enterprise and eCommerce, ubiquitous collaborative and social services, machine-to-machine and Internet-of-things, clouds, cyber-physical integration, and big data analytics for mobility-enabled services
https://magrudy-assets.storage.googleapis.com/9783319943602.jpg
73.490000 USD

Artificial Intelligence and Mobile Services - AIMS 2018: 7th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings

Paperback
Book cover image
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications ...
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.
https://magrudy-assets.storage.googleapis.com/9783319936376.jpg
125.990000 USD

Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings

Paperback
Book cover image
With the computing power of mobile devices and wireless sensors exceeding previous generation large computers, the demand of wireless networking applications is increasing at a dramatic pace. Developments of advanced wireless networks, however, still suffer from the lack of a theoretical foundation that addresses both concerns of efficiency and modularity. ...
Distributed Coding in A Multiple Access Environment
With the computing power of mobile devices and wireless sensors exceeding previous generation large computers, the demand of wireless networking applications is increasing at a dramatic pace. Developments of advanced wireless networks, however, still suffer from the lack of a theoretical foundation that addresses both concerns of efficiency and modularity. This monograph reviews a new research avenue that begins to address the research problem. Focusing on the physical and data link layers, it proposes an interface enhancement that overcomes an efficiency bottleneck in the wireless part of the network. Distributed Coding in A Multiple Access Environment provides a state-of-the-art review of the topic and puts a framework for the efficiency of distributed networking systems when communication optimization cannot be done fully at the physical layer.
https://magrudy-assets.storage.googleapis.com/9781680834680.jpg
103.950000 USD

Distributed Coding in A Multiple Access Environment

by Yanru Tang, Faeze Heydaryan, Jie Luo
Paperback
Book cover image
Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. Key Features Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis ...
Wireshark 2 Quick Start Guide: Secure your network through protocol analysis
Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. Key Features Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis over your network in an event of network failure or a security breach Book DescriptionWireshark is an open source protocol analyser, commonly used among the network and security professionals. Currently being developed and maintained by volunteer contributions of networking experts from all over the globe. Wireshark is mainly used to analyze network traffic, analyse network issues, analyse protocol behaviour, etc. - it lets you see what's going on in your network at a granular level. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies. This book will start from the basics of setting up your Wireshark environment and will walk you through the fundamentals of networking and packet analysis. As you make your way through the chapters, you will discover different ways to analyse network traffic through creation and usage of filters and statistical features. You will look at network security packet analysis, command-line utilities, and other advanced tools that will come in handy when working with day-to-day network operations. By the end of this book, you have enough skill with Wireshark 2 to overcome real-world network challenges. What you will learn Learn how TCP/IP works Install Wireshark and understand its GUI Creation and Usage of Filters to ease analysis process Understand the usual and unusual behaviour of Protocols Troubleshoot network anomalies quickly with help of Wireshark Use Wireshark as a diagnostic tool for network security analysis to identify source of malware Decrypting wireless traffic Resolve latencies and bottleneck issues in the network Who this book is forIf you are a security professional or a network enthusiast who is interested in understanding the internal working of networks and packets, then this book is for you. No prior knowledge of Wireshark is needed.
https://magrudy-assets.storage.googleapis.com/9781789342789.jpg
31.490000 USD

Wireshark 2 Quick Start Guide: Secure your network through protocol analysis

by Charit Mishra
Paperback
Book cover image
The three-volume set LNCS 10918, 10919, and 10290 constitutes the proceedings of the 7th International Conference on Design, User Experience, and Usability, DUXU 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA in July 2018. The total of 1171 papers ...
Design, User Experience, and Usability: Designing Interactions: 7th International Conference, DUXU 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II
The three-volume set LNCS 10918, 10919, and 10290 constitutes the proceedings of the 7th International Conference on Design, User Experience, and Usability, DUXU 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA in July 2018. The total of 1171 papers presented at the HCII 2018 conferences were carefully reviewed and selected from 4346 submissions. The papers cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of applications areas. The total of 165 contributions included in the DUXU proceedings were carefully reviewed and selected for inclusion in this three-volume set. The 50 papers included in this volume are organized in topical sections on design, education and creativity, GUI, visualization and image design, multimodal DUXU, and mobile DUXU.
https://magrudy-assets.storage.googleapis.com/9783319918020.jpg
125.990000 USD

Design, User Experience, and Usability: Designing Interactions: 7th International Conference, DUXU 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II

Paperback
Book cover image
This two-volume set LNCS 10915 and 10916 constitutes the refereed proceedings of the 12h International Conference on Augmented Cognition, AC 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA in July 2018. The 1171 papers presented at HCII 2018 conferences ...
Augmented Cognition: Intelligent Technologies: 12th International Conference, AC 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part I
This two-volume set LNCS 10915 and 10916 constitutes the refereed proceedings of the 12h International Conference on Augmented Cognition, AC 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA in July 2018. The 1171 papers presented at HCII 2018 conferences were carefully reviewed and selected from 4346 submissions. The papers cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of applications areas. The papers in this volume are organized in the following topical sections: context aware adaption strategies in augmented cognition, brain sensors and measures for operational environments, artificial intelligence and machine learning in augmented cognition, augmented cognition in virtual and mixed reality.
https://magrudy-assets.storage.googleapis.com/9783319914695.jpg
89.240000 USD

Augmented Cognition: Intelligent Technologies: 12th International Conference, AC 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part I

Paperback
Book cover image
This book constitutes the proceedings of the 14th International Conference on Latent Variable Analysis and Signal Separation, LVA/ICA 2018, held in Guildford, UK, in July 2018.The 52 full papers were carefully reviewed and selected from 62 initial submissions. As research topics the papers encompass a wide range of general mixtures ...
Latent Variable Analysis and Signal Separation: 14th International Conference, LVA/ICA 2018, Guildford, UK, July 2-5, 2018, Proceedings
This book constitutes the proceedings of the 14th International Conference on Latent Variable Analysis and Signal Separation, LVA/ICA 2018, held in Guildford, UK, in July 2018.The 52 full papers were carefully reviewed and selected from 62 initial submissions. As research topics the papers encompass a wide range of general mixtures of latent variables models but also theories and tools drawn from a great variety of disciplines such as structured tensor decompositions and applications; matrix and tensor factorizations; ICA methods; nonlinear mixtures; audio data and methods; signal separation evaluation campaign; deep learning and data-driven methods; advances in phase retrieval and applications; sparsity-related methods; and biomedical data and methods.
https://magrudy-assets.storage.googleapis.com/9783319937632.jpg
104.990000 USD

Latent Variable Analysis and Signal Separation: 14th International Conference, LVA/ICA 2018, Guildford, UK, July 2-5, 2018, Proceedings

Paperback
Book cover image
Explore how to develop and implement wireless server networks (WSN) using Contiki-NG, branded as the operating system for the IoT. The book explains Contiki-NG's advantages in sensing, communication, and energy optimization and enables you to begin solving problems in automation with WSN. Practical Contiki-NG is a guide to getting started ...
Practical Contiki-NG: Programming for Wireless Sensor Networks
Explore how to develop and implement wireless server networks (WSN) using Contiki-NG, branded as the operating system for the IoT. The book explains Contiki-NG's advantages in sensing, communication, and energy optimization and enables you to begin solving problems in automation with WSN. Practical Contiki-NG is a guide to getting started with Contiki-NG programming featuring projects that demonstrate a variety of applications. This book takes a practical and content-driven approach to the latest technologies, including Raspberry Pi, IoT and cloud servers. Readers will go through step-by-step guides and sample scenarios such as sensing, actuating, connectivity, building middleware, and utilizing IoT and cloud-based technologies. If you're looking to go from zero to hero in using Contiki-NG to build Wireless Sensor Network (WSN) applications then this is the book for you. What You'll Learn Prepare and set up Contiki-NG development Review the basics of the Contiki-NG platform to build Wireless Sensor Networks (WSN) Develop your own Contiki-NG program Perform sensing and actuating on the Contiki-NG platform Implement a middleware for Contiki-NG motes Build a simple IoT program using the Contiki-NG environment Who This Book Is For Developers, students, researchers and anyone who has an interest in Wireless Sensor Network (WSN).
https://magrudy-assets.storage.googleapis.com/9781484234075.jpg
39.890000 USD

Practical Contiki-NG: Programming for Wireless Sensor Networks

by Agus Kurniawan
Paperback
Book cover image
This two volume set constitutes the refereed proceedings of the 6th International Conference on Distributed, Ambient and Pervasive Interactions, DAPI 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, held in Las Vegas, NV, USA in July 2018. The total of 1171 papers and 160 ...
Distributed, Ambient and Pervasive Interactions: Understanding Humans: 6th International Conference, DAPI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part I
This two volume set constitutes the refereed proceedings of the 6th International Conference on Distributed, Ambient and Pervasive Interactions, DAPI 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, held in Las Vegas, NV, USA in July 2018. The total of 1171 papers and 160 posters presented at the 14 colocated HCII 2018 conferences. The papers were carefully reviewed and selected from 4346 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas.. The LNCS 10921 and LNCS 10922 contains papers addressing the following major topics: Technologies and Contexts ( Part I) and Understanding Humans (Part I )
https://magrudy-assets.storage.googleapis.com/9783319911243.jpg
94.490000 USD

Distributed, Ambient and Pervasive Interactions: Understanding Humans: 6th International Conference, DAPI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part I

Paperback
Book cover image
This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies. Key Features Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and so on. Practical guide ...
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies. Key Features Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and so on. Practical guide for system administrators to manage mission-critical servers Based on real-world experience - Written by an industry veteran who has made every possible mistake within this field. Book DescriptionManaging your organization's naming architecture and mitigating risks within complex naming environments is very important. This book will go beyond looking at how to run a name server or how to DNSSEC sign a domain , Managing Mission Critical Domains & DNS looks across the entire spectrum of naming; from external factors that exert influence on your domains to all the internal factors to consider when operating your DNS. The readers are taken on a comprehensive guided tour through the world of naming: from understanding the role of registrars and how they interact with registries, to what exactly is it that ICANN does anyway? Once the prerequisite knowledge of the domain name ecosystem is acquired, the readers are taken through all aspects of DNS operations. Whether your organization operates its own nameservers or utilizes an outsourced vendor, or both, we examine the complex web of interlocking factors that must be taken into account but are too frequently overlooked. By the end of this book, our readers will have an end to end to understanding of all the aspects covered in DNS name servers. What you will learn Anatomy of a domain - how a domain is the sum of both its DNS zone and its registration data, and why that matters. The domain name ecosystem - the role of registries, registrars and oversight bodies and their effect on your names. How DNS queries work - queries and responses are examined including debugging techniques to zero in on problems. Nameserver considerations - alternative nameserver daemons, numbering considerations, and deployment architectures. DNS use cases - the right way for basic operations such as domain transfers, large scale migrations, GeoDNS, Anycast DNS. Securing your domains - All aspects of security from registrar vendor selection, to DNSSEC and DDOS mitigation strategies. Who this book is forIdeal for sysadmins, webmasters, IT consultants, and developers-anyone responsible for maintaining your organization's core DNS
https://magrudy-assets.storage.googleapis.com/9781789135077.jpg
47.240000 USD

Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

by Mark Jeftovic
Paperback
Book cover image
This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers ...
Information Security Theory and Practice: 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings
This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms.
https://magrudy-assets.storage.googleapis.com/9783319935232.jpg
62.990000 USD

Information Security Theory and Practice: 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings

Paperback
Book cover image
This book constitutes the refereed proceedings of the 18th International Conference on Innovations for Community Services, I4CS 2018, held in Zilina, Slovakia, in June 2018. The 14 revised full papers and the three revised short papers presented in this volume were carefully reviewed and selected from 38 submissions. The papers ...
Innovations for Community Services: 18th International Conference, I4CS 2018, Zilina, Slovakia, June 18-20, 2018, Proceedings
This book constitutes the refereed proceedings of the 18th International Conference on Innovations for Community Services, I4CS 2018, held in Zilina, Slovakia, in June 2018. The 14 revised full papers and the three revised short papers presented in this volume were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on architectures and management; data analytics and models; community and public collaboration; innovations and digital transformation.
https://magrudy-assets.storage.googleapis.com/9783319934075.jpg
89.240000 USD

Innovations for Community Services: 18th International Conference, I4CS 2018, Zilina, Slovakia, June 18-20, 2018, Proceedings

Paperback
Book cover image
Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning ...
Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. What you will learn Achieve an effective security posture to design security architectures Learn vital security aspects before moving to the Cloud Launch secure applications with Web Application Security and SQL Injection Explore the basics of threat detection/response/ mitigation with important use cases Learn all about integration principles for PKI and tips to secure it Design a WAN infrastructure and ensure security over a public WAN Who this book is forIf you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you.
https://magrudy-assets.storage.googleapis.com/9781788839235.jpg
41.990000 USD

Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus

by Ajay Singh Chauhan
Paperback
Book cover image
This volume constitutes the proceedings of the 7th International Conference on BIGDATA 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 22 full papers together with 10 short papers published in this volume were carefully reviewed and selected from 97 submissions. They are organized ...
Big Data - BigData 2018: 7th International Congress, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
This volume constitutes the proceedings of the 7th International Conference on BIGDATA 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 22 full papers together with 10 short papers published in this volume were carefully reviewed and selected from 97 submissions. They are organized in topical sections such as Data analysis, data as a service, services computing, data conversion, data storage, data centers, dataflow architectures, data compression, data exchange, data modeling, databases, and data management.
https://magrudy-assets.storage.googleapis.com/9783319943008.jpg
83.990000 USD

Big Data - BigData 2018: 7th International Congress, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings

Paperback
Book cover image
This book constitutes the proceedings of the 13th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2018, held in Tianjin, China, in June 2018. The 59 full papers and 18 short papers presented in this book were carefully reviewed and selected from 197 submissions. The papers cover various topics ...
Wireless Algorithms, Systems, and Applications: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings
This book constitutes the proceedings of the 13th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2018, held in Tianjin, China, in June 2018. The 59 full papers and 18 short papers presented in this book were carefully reviewed and selected from 197 submissions. The papers cover various topics such as cognitive radio networks; wireless sensor networks; cyber-physical systems; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobile cloud computing; topology control and coverage; security and privacy; underwater and underground networks; vehicular networks; internet of things; information processing and data management; programmable service interfaces; energy-efficient algorithms; system and protocol design; operating system and middle-ware support; and experimental test-beds, models and case studies.
https://magrudy-assets.storage.googleapis.com/9783319942674.jpg
136.490000 USD

Wireless Algorithms, Systems, and Applications: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings

Paperback
Book cover image
This book constitutes the proceedings of the 15th International Workshop on Algorithms and Models for the Web Graph, WAW 2018, held in Moscow, Russia in May 2018. The 11 full papers presented in this volume were carefully reviewed and selected from various submissions. The papers focus on topics like the ...
Algorithms and Models for the Web Graph: 15th International Workshop, WAW 2018, Moscow, Russia, May 17-18, 2018, Proceedings
This book constitutes the proceedings of the 15th International Workshop on Algorithms and Models for the Web Graph, WAW 2018, held in Moscow, Russia in May 2018. The 11 full papers presented in this volume were carefully reviewed and selected from various submissions. The papers focus on topics like the information retrieval and data mining on the Web; Web as a text repository and as a graph, induced in various ways by link among pages, hosts and users; the understanding of graphs that arise from the Web and various user activities on the Web; stimulation of the development of high-performance algorithms and applications that exploit these graphs.
https://magrudy-assets.storage.googleapis.com/9783319928708.jpg
62.990000 USD

Algorithms and Models for the Web Graph: 15th International Workshop, WAW 2018, Moscow, Russia, May 17-18, 2018, Proceedings

Paperback
Book cover image
This book contains revised selected papers presented at 4 workshops held at the 16th IFIP TC 13 International Conference on Human-Computer Interaction, INTERACT 2017, in Mumbai, India, in September 2017. The workshops are: Workshop on Dealing with Conflicting User Interface Properties in User-Centered Development Processes (IFIP WG 13.2 and 13.5), ...
Global Thoughts, Local Designs: INTERACT 2017 IFIP TC 13 Workshops, Mumbai, India, September 25-27, 2017, Revised Selected Papers
This book contains revised selected papers presented at 4 workshops held at the 16th IFIP TC 13 International Conference on Human-Computer Interaction, INTERACT 2017, in Mumbai, India, in September 2017. The workshops are: Workshop on Dealing with Conflicting User Interface Properties in User-Centered Development Processes (IFIP WG 13.2 and 13.5), Workshop on Cross Cultural Differences in Designing for Accessibility and Universal Design Organizers (IFIP WG 13.3), Human Work Interaction Design Meets International Development (IFIP WG 13.6), and Beyond Computers: Wearables, Humans, and Things - WHAT! (IFIP WG 13.7). The 15 full papers included in this volume were carefully reviewed and selected from numerous submissions. They show advances in the field of HCI dealing with topics such as human-centered computing, user interface design, evolutionary user interface prototyping, end-user development systems, accessibility design, human work interaction design, and wearables.
https://magrudy-assets.storage.googleapis.com/9783319920801.jpg
62.990000 USD

Global Thoughts, Local Designs: INTERACT 2017 IFIP TC 13 Workshops, Mumbai, India, September 25-27, 2017, Revised Selected Papers

Paperback
Book cover image
This two-volume set LNCS 10909 and 10910 constitutes the refereed proceedings of the 10th International Conference on Virtual, Augmented and Mixed Reality, VAMR 2018, held as part of HCI International 2018 in Las Vegas, NV, USA. HCII 2018 received a total of 4346 submissions, of which 1171 papers and 160 ...
Virtual, Augmented and Mixed Reality: Interaction, Navigation, Visualization, Embodiment, and Simulation: 10th International Conference, VAMR 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part I
This two-volume set LNCS 10909 and 10910 constitutes the refereed proceedings of the 10th International Conference on Virtual, Augmented and Mixed Reality, VAMR 2018, held as part of HCI International 2018 in Las Vegas, NV, USA. HCII 2018 received a total of 4346 submissions, of which 1171 papers and 160 posters were accepted for publication after a careful reviewing process. The 65 papers presented in this volume were organized in topical sections named: interaction, navigation, and visualization in VAMR; embodiment, communication, and collaboration in VAMR; education, training, and simulation; VAMR in psychotherapy, exercising, and health; virtual reality for cultural heritage, entertainment, and games; industrial and military applications.
https://magrudy-assets.storage.googleapis.com/9783319915807.jpg
89.240000 USD

Virtual, Augmented and Mixed Reality: Interaction, Navigation, Visualization, Embodiment, and Simulation: 10th International Conference, VAMR 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part I

Paperback
Book cover image
Develop a solid understanding of the important command-line tools and utilities in Linux Key Features Delve into the fundamentals of Linux Explore and work with virtualization, command lines, and Bash shell scripts Use special file permission flags such as setuid and setgid Book DescriptionLinux is a Unix-like operating system assembled ...
Fundamentals of Linux: Explore the essentials of the Linux command line
Develop a solid understanding of the important command-line tools and utilities in Linux Key Features Delve into the fundamentals of Linux Explore and work with virtualization, command lines, and Bash shell scripts Use special file permission flags such as setuid and setgid Book DescriptionLinux is a Unix-like operating system assembled under the model of free and open source software development and distribution. Fundamentals of Linux will help you learn all the essentials of the Linux command line required to get you started. The book will start by teaching you how to work with virtualization software and install CentOS 7 Linux as a VM. Then, you will get to grips with the workings of various command line operations, such as cursor movement, commands, options, and arguments. As you make your way through the chapters, the book will not only focus on the most essential Linux commands but also give an introduction to Bash shell scripting. Finally, you will explore advanced topics, such as networking and troubleshooting your system, and you will get familiar with the advanced file permissions: ACL, setuid, and setgid. Fundamentals of Linux includes real-world tasks, use cases, and problems that, as a system administrator, you might encounter in your day-to-day activities. What you will learn Explore basic and advanced command-line concepts Install Linux, work with VirtualBox, and install CentOS 7 in VirtualBox Work with the command line efficiently and learn how to navigate through the Linux filesystem Create file and user group permissions and edit files Use Sticky bit to secure your Linux filesystem Define and remove ACL from Linux files Who this book is forFundamentals of Linux is for individuals looking to work as a Linux system administrator.
https://magrudy-assets.storage.googleapis.com/9781789530957.jpg
31.490000 USD

Fundamentals of Linux: Explore the essentials of the Linux command line

by Oliver Pelz
Paperback
Book cover image
The three-volume set LNCS 10918, 10919, and 10290 constitutes the proceedings of the 7th International Conference on Design, User Experience, and Usability, DUXU 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA in July 2018. The total of 1171 papers ...
Design, User Experience, and Usability: Theory and Practice: 7th International Conference, DUXU 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part I
The three-volume set LNCS 10918, 10919, and 10290 constitutes the proceedings of the 7th International Conference on Design, User Experience, and Usability, DUXU 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA in July 2018. The total of 1171 papers presented at the HCII 2018 conferences were carefully reviewed and selected from 4346 submissions. The papers cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of applications areas. The total of 165 contributions included in the DUXU proceedings were carefully reviewed and selected for inclusion in this three-volume set. The 55 papers included in this volume are organized in topical sections on design thinking, methods and practice, usability and user experience evaluation methods and tools, and DUXU in software development.
https://magrudy-assets.storage.googleapis.com/9783319917962.jpg
146.990000 USD

Design, User Experience, and Usability: Theory and Practice: 7th International Conference, DUXU 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part I

Paperback
Book cover image
Gain industry best practices from planning to implementing Microsoft Teams and learn how to enable, configure, and integrate user provisioning, management, and monitoring. This book also covers troubleshooting Teams with step-by-step instructions and examples. Introducing Microsoft Teams gives you the comprehensive coverage you need to creatively utilize Microsoft Teams services. ...
Introducing Microsoft Teams: Understanding the New Chat-Based Workspace in Office 365
Gain industry best practices from planning to implementing Microsoft Teams and learn how to enable, configure, and integrate user provisioning, management, and monitoring. This book also covers troubleshooting Teams with step-by-step instructions and examples. Introducing Microsoft Teams gives you the comprehensive coverage you need to creatively utilize Microsoft Teams services. The author starts by giving an introduction to Microsoft Teams and its architecture followed by optimizing the Teams experience where he describes how organizations can prepare for Teams and enhance existing services. He further shows you how to manage and control the Microsoft Teams experience along with its capabilities and enhancements. You'll learn how to migrate from Skype for Business to Microsoft Teams with a step-by-step tutorial. Finally, you'll get to grips with Teams troubleshooting and best practices. This book has detailed coverage that helps you exploit every capability Microsoft Teams has to offer. It provides the answers you need and the insight that will make your journey from Skype for Business to Teams easier. What You Will Learn Enable guest access in Teams Provision and manage users in Teams Administrate Teams and channels Optimize the Teams experience Enable and configure Microsoft Teams Prepare your network for Microsoft Teams and Office 365 services Migrate from Skype for Business to Microsoft Teams Who This Book Is For Unified communication administrators and IT support engineers who are currently supporting an existing unified communication platform such as Skype for Business (Lync). It would also help support engineers, new administrators, and consultant to start their journey with Teams.
https://magrudy-assets.storage.googleapis.com/9781484235669.jpg
39.890000 USD

Introducing Microsoft Teams: Understanding the New Chat-Based Workspace in Office 365

by Balu N Ilag
Paperback
Book cover image
This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring ...
Advanced Monitoring in P2P Botnets: A Dual Perspective
This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.
https://magrudy-assets.storage.googleapis.com/9789811090493.jpg
73.490000 USD

Advanced Monitoring in P2P Botnets: A Dual Perspective

by Shankar Karuppayah
Paperback
Book cover image
This book presents current trends that are dominating technology and society, including privacy, high performance computing in the cloud, networking and IoT, and bioinformatics. By providing chapters detailing accessible descriptions of the research frontiers in each of these domains, the reader is provided with a unique understanding of what is ...
Proceedings of International Symposium on Sensor Networks, Systems and Security: Advances in Computing and Networking with Applications
This book presents current trends that are dominating technology and society, including privacy, high performance computing in the cloud, networking and IoT, and bioinformatics. By providing chapters detailing accessible descriptions of the research frontiers in each of these domains, the reader is provided with a unique understanding of what is currently feasible. Readers are also given a vision of what these technologies can be expected to produce in the near future. The topics are covered comprehensively by experts in respective areas. Each section includes an overview that puts the research topics in perspective and integrates the sections into an overview of how technology is evolving. The book represents the proceedings of the International Symposium on Sensor Networks, Systems and Security, August 31 - September 2, 2017, Lakeland Florida.
https://magrudy-assets.storage.googleapis.com/9783319756820.jpg
230.990000 USD

Proceedings of International Symposium on Sensor Networks, Systems and Security: Advances in Computing and Networking with Applications

Hardback
Book cover image
This two-volume set LNCS 10911 and 10912 constitutes the refereed proceedings of the 10th International Conference on Cross-Cultural Design, CCD 2018, held as part of HCI International 2018 in Las Vegas, NV, USA, in July 2018.The total of 1170 papers and 195 posters included in the 30 HCII 2018 proceedings ...
Cross-Cultural Design. Methods, Tools, and Users: 10th International Conference, CCD 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part I
This two-volume set LNCS 10911 and 10912 constitutes the refereed proceedings of the 10th International Conference on Cross-Cultural Design, CCD 2018, held as part of HCI International 2018 in Las Vegas, NV, USA, in July 2018.The total of 1170 papers and 195 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4373 submissions.The 36 regular papers presented in this volume were organized in topical sections named: cross-cultural design methods and tools; cross-cultural product design; cultural Differences; and culture, emotions and design.
https://magrudy-assets.storage.googleapis.com/9783319921402.jpg
89.240000 USD

Cross-Cultural Design. Methods, Tools, and Users: 10th International Conference, CCD 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part I

Paperback
Book cover image
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing ...
Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing theory; cybersecurity and quality service.
https://magrudy-assets.storage.googleapis.com/9783319924588.jpg
104.990000 USD

Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings

Paperback
Book cover image
Cognitive radio networks (CRN) will be widely deployed in the near future, and this SpringerBrief covers some important aspects of it, as well as highlighting optimization strategies in Resource Allocation and Spectrum Sensing in CRNs. The cognitive approach in radio access is introduced in the first part of this SpringerBrief, ...
Cooperative Spectrum Sensing and Resource Allocation Strategies in Cognitive Radio Networks
Cognitive radio networks (CRN) will be widely deployed in the near future, and this SpringerBrief covers some important aspects of it, as well as highlighting optimization strategies in Resource Allocation and Spectrum Sensing in CRNs. The cognitive approach in radio access is introduced in the first part of this SpringerBrief, and then next the benefits of cooperative spectrum sensing are highlighted and a framework for studying it under realistic channel conditions is described. New exact closed-form expressions for average false alarm probability and average detection probability are derived in this scenario. A novel approximation to alleviate the computational complexity of the proposed models are also discussed. Once the spectrum opportunities are identified, efficient and systematic resource allocation (RA) shall be performed. The second part of this SpringerBrief describes the taxonomy for the RA process in CRN. A comprehensive overview of the optimization strategies of the CRN RA is also provided. The device-to-device (D2D) communication scenario is discussed, then as a case study and various optimization strategies for the application of the CR technology in the D2D realm is studied. The application of advanced geometric water-filling (GWF) approach in CRN D2D environment for optimum resource allocation is presented in detail. Numerical results provide more insight quantitatively. Overall, this book is suitable for a wide audience that include students, faculty and researchers in wireless communication area and professionals in the wireless service industry.
https://magrudy-assets.storage.googleapis.com/9783319739564.jpg
73.490000 USD

Cooperative Spectrum Sensing and Resource Allocation Strategies in Cognitive Radio Networks

by Xavier Fernando, Ajmery Sultana, Sattar Hussain, Lian Zhao
Paperback
Book cover image
This book contains revised and extended versions of selected papers from the 6th International Conference on Pattern Recognition, ICPRAM 2016, held in Porto, Portugal, in February 2017. The 13 full papers presented were carefully reviewed and selected from 139 initial submissions. They aim at making visible and understandable the relevant ...
Pattern Recognition Applications and Methods: 6th International Conference, ICPRAM 2017, Porto, Portugal, February 24-26, 2017, Revised Selected Papers
This book contains revised and extended versions of selected papers from the 6th International Conference on Pattern Recognition, ICPRAM 2016, held in Porto, Portugal, in February 2017. The 13 full papers presented were carefully reviewed and selected from 139 initial submissions. They aim at making visible and understandable the relevant trends of current research on pattern recognition.
https://magrudy-assets.storage.googleapis.com/9783319936468.jpg
73.490000 USD

Pattern Recognition Applications and Methods: 6th International Conference, ICPRAM 2017, Porto, Portugal, February 24-26, 2017, Revised Selected Papers

Paperback
Book cover image
The two-volume set of LNCS 10941 and 10942 constitutes the proceedings of the 9th International Conference on Advances in Swarm Intelligence, ICSI 2018, held in Shanghai, China, in June 2018. The total of 113 papers presented in these volumes was carefully reviewed and selected from 197 submissions. The papers were ...
Advances in Swarm Intelligence: 9th International Conference, ICSI 2018, Shanghai, China, June 17-22, 2018, Proceedings, Part I
The two-volume set of LNCS 10941 and 10942 constitutes the proceedings of the 9th International Conference on Advances in Swarm Intelligence, ICSI 2018, held in Shanghai, China, in June 2018. The total of 113 papers presented in these volumes was carefully reviewed and selected from 197 submissions. The papers were organized in topical sections as follows: theories and models of swarm intelligence; ant colony optimization; particle swarm optimization; artificial bee colony algorithms; genetic algorithms; differential evolution; fireworks algorithms; bacterial foraging optimization; artificial immune system; hydrologic cycle optimization; other swarm-based optimization algorithms; hybrid optimization algorithms; multi-objective optimization; large-scale global optimization; multi-agent systems; swarm robotics; fuzzy logic approaches; planning and routing problems; recommendation in social media; prediction, classification; finding patterns; image enhancement; deep learning.
https://magrudy-assets.storage.googleapis.com/9783319938141.jpg
115.490000 USD

Advances in Swarm Intelligence: 9th International Conference, ICSI 2018, Shanghai, China, June 17-22, 2018, Proceedings, Part I

Paperback
Page 1 of 40