• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » Springerbriefs in Computer Science

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC
 
Building Secure Defenses Against Code-Reuse Attacks

Lucas Davi; Ahmad-Reza Sadeghi

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.

Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time...

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks an...

cena: 201,72 zł
 
Distributed Hash Table: Theory, Platforms and Applications

Hao Zhang; Yonggang Wen; Haiyong Xie
This SpringerBrief summarizes the development of Distributed Hash Table in both academic and industrial fields. It covers the main theory, platforms and applications of this key part in distributed systems and applications, especially in large-scale distributed environments. The authors teach the principles of several popular DHT platforms that can solve practical problems such as load balance, multiple replicas, consistency and latency. They also propose DHT-based applications including multicast, anycast, distributed file systems, search, storage, content delivery network, file sharing and...
This SpringerBrief summarizes the development of Distributed Hash Table in both academic and industrial fields. It covers the main theory, platforms a...
cena: 201,72 zł
 
Data Center Networks: Topologies, Architectures and Fault-Tolerance Characteristics

Yang Liu; Jogesh K. Muppala; Malathi Veeraraghavan
This SpringerBrief presents a survey of data center network designs and topologies and compares several properties in order to highlight their advantages and disadvantages. The brief also explores several routing protocols designed for these topologies and compares the basic algorithms to establish connections, the techniques used to gain better performance, and the mechanisms for fault-tolerance. Readers will be equipped to understand how current research on data center networks enables the design of future architectures that can improve performance and dependability of data centers. This...
This SpringerBrief presents a survey of data center network designs and topologies and compares several properties in order to highlight their advanta...
cena: 201,72 zł
 
Spatio-Temporal Databases: Complex Motion Pattern Queries

Marcos R. Vieira; Vassilis J. Tsotras
This brief presents several new query processing techniques, called complex motion pattern queries, specifically designed for very large spatio-temporal databases of moving objects. The brief begins with the definition of flexible pattern queries, which are powerful because of the integration of variables and motion patterns. This is followed by a summary of the expressive power of patterns and flexibility of pattern queries. The brief then present the Spatio-Temporal Pattern System (STPS) and density-based pattern queries. STPS databases contain millions of records with information about...
This brief presents several new query processing techniques, called complex motion pattern queries, specifically designed for very large spatio-tempor...
cena: 201,72 zł
 
Intermittently Connected Mobile Ad Hoc Networks: From Routing to Content Distribution

Abbas Jamalipour; Yaozhou Ma
In the last few years, there has been extensive research activity in the emerging area of Intermittently Connected Mobile Ad Hoc Networks (ICMANs). By considering the nature of intermittent connectivity in most real word mobile environments without any restrictions placed on users' behavior, ICMANs are eventually formed without any assumption with regard to the existence of a end-to-end path between two nodes wishing to communicate. It is different from the conventional Mobile Ad Hoc Networks (MANETs), which have been implicitly viewed as a connected graph with established complete paths...
In the last few years, there has been extensive research activity in the emerging area of Intermittently Connected Mobile Ad Hoc Networks (ICMANs). By...
cena: 201,72 zł
 
Software Similarity and Classification

Silvio Cesare; Yang Xiang
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each...
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft...
cena: 201,72 zł
 
Criminal Justice Forecasts of Risk: A Machine Learning Approach

Richard Berk
Machine learning and nonparametric function estimation procedures can be effectively used in forecasting. One important and current application is used to make forecasts of "future dangerousness" to inform criminal justice decision. Examples include the decision to release an individual on parole, determination of the parole conditions, bail recommendations, and sentencing. Since the 1920s, "risk assessments" of various kinds have been used in parole hearings, but the current availability of large administrative data bases, inexpensive computing power, and developments in statistics and...
Machine learning and nonparametric function estimation procedures can be effectively used in forecasting. One important and current application is use...
cena: 221,90 zł
 
Sentiment Analysis for Ptsd Signals

Vadim Kagan; Edward Rossini; Demetrios Sapounas
This book describes a computational framework for real-time detection of psychological signals related to Post-Traumatic Stress Disorder (PTSD) in online text-based posts, including blogs and web forums. Further, it explores how emerging computational techniques such as sentiment mining can be used in real-time to identify posts that contain PTSD-related signals, flag those posts, and bring them to the attention of psychologists, thus providing an automated flag and referral capability. The use of sentiment extraction technologies allows automatic in-depth analysis of opinions and emotions...
This book describes a computational framework for real-time detection of psychological signals related to Post-Traumatic Stress Disorder (PTSD) in onl...
cena: 201,72 zł
 
Autonomic Cooperative Networking

Michal W. Dczak
Cooperative transmission aims to improve the reliability of wireless mobile communications through the use of diversity provided by additional relays assisting in the transmission between the source and destination nodes. This is possible as the rationale behind spatio-temporal processing can be easily mapped onto networked systems. Autonomic Cooperative Networking studies the further evolution of this phenomenon by first involving the network layer routines and then additionally incorporating the notion of autonomic system design.
Cooperative transmission aims to improve the reliability of wireless mobile communications through the use of diversity provided by additional relays ...
cena: 201,72 zł
 
Power Distribution and Performance Analysis for Wireless Communication Networks

Dongmei Zhao
This book provides an analysis of transmission power and network performance in different wireless communication networks. It presents the latest research and techniques for power and interference control and performance modeling in wireless communication networks with different network topologies, air interfaces, and transmission techniques. While studying the power distributions and resource management, the reader will also learn basic methodology and skills for problem formulations, can ascertain the complexity for designing radio resource management strategies in modern wireless...
This book provides an analysis of transmission power and network performance in different wireless communication networks. It presents the latest rese...
cena: 201,72 zł
ilość książek w kategorii: 352
Pierwsza Podprzednia  1  2  3  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia