This book explains how to use a data-driven approach to design strategies for social media content delivery. Secondly, the book describes data-driven models to capture information diffusion in online social networks and social media content propagation and popularity, before presenting prediction models for social media content delivery.
This book explains how to use a data-driven approach to design strategies for social media content delivery. Secondly, the book describes data-driven ...
This SpringerBrief introduces key techniques for 5G wireless networks. The authors cover the development of wireless networks that led to 5G, and how 5G mobile communication technology (5G) can no longer be defined by a single business model or a typical technical characteristic. The discussed networks functions and services include Network Foundation Virtualization (N-FV), Cloud Radio Access Networks (Cloud-RAN), and Mobile Cloud Networking (MCN). The benefits of cloud platforms are examined, as are definable networking and green wireless networking. Other related and representative projects...
This SpringerBrief introduces key techniques for 5G wireless networks. The authors cover the development of wireless networks that led to 5G, and how ...
This SpringerBrief explains the emerging cyber threats that undermine Android application security. It further explores the opportunity to leverage the cutting-edge semantics and context-aware techniques to defend against such threats, including zero-day Android malware, deep software vulnerabilities, privacy breach and insufficient security warnings in app descriptions. The authors begin by introducing the background of the field, explaining the general operating system, programming features, and security mechanisms. The authors capture the semantic-level behavior of mobile applications and...
This SpringerBrief explains the emerging cyber threats that undermine Android application security. It further explores the opportunity to leverage th...
This SpringerBrief explores features of digital protocol wireless communications systems, and features of the emerging electrical smart grid. Both low power and high power wireless systems are described. The work also examines the cybersecurity vulnerabilities, threats and current levels of risks to critical infrastructures that rely on digital wireless technologies. Specific topics include areas of application for high criticality wireless networks (HCWN), modeling risks and vulnerabilities, governance and management frameworks, systemic mitigation, reliable operation, assessing...
This SpringerBrief explores features of digital protocol wireless communications systems, and features of the emerging electrical smart grid. Both low...
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of security provided, how efficient the verification process is, who can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to t he input and/or output data is...
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsou...
This work offers a guided walkthrough of one of the most promising research areas in modern life sciences, enabling a deeper understanding of involved concepts and methodologies via an interdisciplinary view, focusing on both well-established approaches and cutting-edge research. Highlighting what pathway analysis can offer to both the experimentalist and the modeler, the text opens with an introduction to a general methodology that outlines common workflows shared by several methods. This is followed by a review of pathway and sub-pathway based approaches for systems pharmacology. The work...
This work offers a guided walkthrough of one of the most promising research areas in modern life sciences, enabling a deeper understanding of involved...
This book examines how creativity feeds through into typical application areas, and the lessons that can be learned from this. A number of Case Studies in creative and general application domains are included which illustrate how the academy and industry can collaborate to mutual benefit and advantage. It also examines the pros and cons of the collaboration, and what lessons can be learned from successes or failures in aspects of the implementation and delivery.
The academy has played a key role in the past in the research and development of key ideas and patents that have been...
This book examines how creativity feeds through into typical application areas, and the lessons that can be learned from this. A number of Case Stu...
This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It then discusses in detail the principles and metrics of evaluating safety and privacy in TCPSs and elaborates the verification and analysis of secure, robust and trustworthy TCPSs.
This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It then discusses in detail ...
This book investigates the pressing issue of resource management for Internet of Things (IoT). The unique IoT ecosystem poses new challenges and calls for unique and bespoke solutions to deal with these challenges. Using a holistic approach, the authors present a thorough study into the allocation of the resources available within IoT systems to accommodate application requirements. This is done by investigating different functionalities and architectural approaches involved in a basic workflow for managing the lifecycle of resources in an IoT system.
Resource Management for the...
This book investigates the pressing issue of resource management for Internet of Things (IoT). The unique IoT ecosystem poses new challenges and calls...
This SpringerBrief provides a synergistic overview of technology trends by emphasizing five linked perspectives: crowd+cloud machines, extreme cooperation with smart things, scalable context-awareness, drone services for mobile crowds and social links in mobile crowds. The authors also highlight issues and challenges at the intersection of these trends. Topics covered include cloud computing, Internet of Things, mobile and wearable computing, crowd computing, the culture of thing sharing, collective computing, and swarm dynamics. The brief is a useful resource and a starting point for...
This SpringerBrief provides a synergistic overview of technology trends by emphasizing five linked perspectives: crowd+cloud machines, extreme coopera...