This brief will explore topics in computer science through the lens of Two Bit Circus, an engineering entertainment company based out of downtown Los Angeles. This brief examines the ways they apply computer science to a wide variety of applications, including interactive games, immersive adventures, and virtual reality. The authors demonstrate how technology can encourage children and adults to become more comfortable with the STEAM field. Educators and people interested in the ways that innovation and technology can solve current problems in entertainment, healthcare, education, and...
This brief will explore topics in computer science through the lens of Two Bit Circus, an engineering entertainment company based out of downtown L...
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel.
...
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overvi...
Sensor networks comprise of a number of sensors installed across a spatially distributed network, which gather information and periodically feed a central server with the measured data. The server monitors the data, issues possible alarms and computes fast aggregates. As data analysis requests may concern both present and past data, the server is forced to store the entire stream. But the limited storage capacity of a server may reduce the amount of data stored on the disk. One solution is to compute summaries of the data as it arrives, and to use these summaries to interpolate the real data....
Sensor networks comprise of a number of sensors installed across a spatially distributed network, which gather information and periodically feed a cen...
After a brief introduction and contextualization on the Internet of Things (IoT) and Web of Things (WoT) paradigms, this timely new book describes one of the first research initiatives aimed at tackling the several challenges involved in building a middleware-layer infrastructure capable of realizing the WoT vision: the SmartSensor infrastructure. It is based on current standardization efforts and designed to manage a specific type of physical devices, those organized to shape a Wireless Sensor Network (WSN), where sensors work collaboratively, extracting data and transmitting it to...
After a brief introduction and contextualization on the Internet of Things (IoT) and Web of Things (WoT) paradigms, this timely new book describes ...
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature...
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the ...
This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete...
This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustain...
This Springer Brief presents a basic algorithm that provides a correct solution to finding an optimal state change attempt, as well as an enhanced algorithm that is built on top of the well-known trie data structure. It explores correctness and algorithmic complexity results for both algorithms and experiments comparing their performance on both real-world and synthetic data. Topics addressed include optimal state change attempts, state change effectiveness, different kind of effect estimators, planning under uncertainty and experimental evaluation. These topics will help researchers analyze...
This Springer Brief presents a basic algorithm that provides a correct solution to finding an optimal state change attempt, as well as an enhanced alg...
This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into...
This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation bet...
This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in...
This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over hetero...
This Springer Brief focuses on the current state-of-the-art research on spectrum sensing by using energy detection, a low-complexity and low-cost technique. It includes a comprehensive summary of recent research, fundamental theories, possible architectures, useful performance measurements of energy detection and applications of energy detection. Concise, practical chapters explore conventional energy detectors, alternative forms of energy detectors, performance measurements, diversity techniques and cooperative networks. The careful analysis enables reader to identify the most efficient...
This Springer Brief focuses on the current state-of-the-art research on spectrum sensing by using energy detection, a low-complexity and low-cost tech...