![]() |
Smart Grid and Innovative Frontiers in Telecommunications: 7th EAI International Conference, SmartGIFT 2022, Changsha, China, December 10-12, 2022, Proceedings
ISBN: 9783031317323 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7thInternational Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2022, held in Changsha, China, in December 10-12, 2022The 44 full papers were selected from 116 submissions and focus on new challenges and opportunities of intelligent technologies in new energy systems.The papers are the papers are divided into the following areas: Simulation and analysis of the integrated energy system, disaster prevention & reduction for power grid, industry 4.0 applications, flexible planning and regulation techniques...
This book constitutes the refereed proceedings of the 7thInternational Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartG...
|
cena:
410,09 |
![]() |
Collaborative Networks in Digitalization and Society 5.0
ISBN: 9783031148460 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 23rd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2022, held in Lisbon, Portugal, in September 2022. The 55 papers presented were carefully reviewed and selected from 119 submissions. They provide a comprehensive overview of major challenges and recent advances in various domains related to the digital transformation and collaborative networks and their applications with a strong focus on the following areas related to the main theme of the conference: sustainable collaborative networks; sustainability... This book constitutes the refereed proceedings of the 23rd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2022, held in Lisbon, Port... |
cena:
410,09 |
![]() |
Artificial Intelligence and Robotics: 8th International Symposium, Isair 2023, Beijing, China, October 21-23, 2023, Revised Selected Papers
ISBN: 9789819991082 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
410,09 |
![]() |
Privacy Preserving Data Mining
ISBN: 9780387258867 / Angielski / Twarda / 122 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Privacy preserving data mining implies the "mining" of knowledge from distributed data without violating the privacy of the individual/corporations involved in contributing the data. This volume provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. Crystallizing much of the underlying foundation, the book aims to inspire further research in this new and growing area. Privacy Preserving Data Mining is intended to be accessible to industry practitioners and policy makers, to help inform future decision making and... Privacy preserving data mining implies the "mining" of knowledge from distributed data without violating the privacy of the individual/corporations... |
cena:
410,09 |
![]() |
Understanding Intrusion Detection Through Visualization
ISBN: 9780387276342 / Angielski / Twarda / 145 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This monograph is the outgrowth of Stefan Axelson's PhD Dissertation at Chalmers University in Goteborg, Sweden. The dissertation, in turn collects a number of research efforts performed over a period of six years or so into a coherent whole. It was my honor to serve as the "opponent" at Dr. Axelsson's examination. In the Swedish system, it is the job of the opponent to place the candidate's work into a broader perspective, demonstrating its significance and contributions to the field and then to introduce the work to the attendees at the examination. This done, the candidate presents the...
This monograph is the outgrowth of Stefan Axelson's PhD Dissertation at Chalmers University in Goteborg, Sweden. The dissertation, in turn collects a ...
|
cena:
410,09 |
![]() |
Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems
ISBN: 9780387288734 / Angielski / Twarda / 268 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Several works on multimedia storage appear in literature today, but very little if any, have been devoted to handling long duration video retrieval, over large scale networks. Distributed retrieval of multimedia documents, especially the long duration documents, is an imperative step in rendering high-quality, high-fidelity, and cost-effective services for network service providers. Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems presents an up-to-date research status in the domain of distributed video retrieval. This... Several works on multimedia storage appear in literature today, but very little if any, have been devoted to handling long duration video retrieval... |
cena:
410,09 |
![]() |
Cryptographics: Exploiting Graphics Cards for Security
ISBN: 9780387290157 / Angielski / Twarda / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes. CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs... Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficult... |
cena:
410,09 |
![]() |
Ontology Learning and Population from Text: Algorithms, Evaluation and Applications
ISBN: 9780387306322 / Angielski / Twarda / 347 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the last decade, ontologies have received much attention within computer science and related disciplines, most often as the semantic web. Ontology Learning and Population from Text: Algorithms, Evaluation and Applications discusses ontologies for the semantic web, as well as knowledge management, information retrieval, text clustering and classification, as well as natural language processing. Ontology Learning and Population from Text: Algorithms, Evaluation and Applications is structured for research scientists and practitioners in industry. This book is also suitable for... In the last decade, ontologies have received much attention within computer science and related disciplines, most often as the semantic web. Ontolo... |
cena:
410,09 |
![]() |
Eunice 2005: Networks and Applications Towards a Ubiquitously Connected World: Ifip International Workshop on Networked Applications, Colmenarejo, Mad
ISBN: 9780387308159 / Angielski / Twarda / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. EUNICE is a network of Universities throughout Europe. The EUNICE network has been created to foster the mobility of students, faculty nembers and research scientists working in the field of information and com llunication technologies and to promote educational and research cooperation between its member institutions. The prime means for implementing these goals is the annual Summer School organized by the member institutions. From its conception, the EUNICE Summer Schools were designed as unique events where the joint participation of PhD students and supervisors working in the field of...
EUNICE is a network of Universities throughout Europe. The EUNICE network has been created to foster the mobility of students, faculty nembers and res...
|
cena:
410,09 |
![]() |
Network Security Policies and Procedures
ISBN: 9780387309378 / Angielski / Twarda / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization s security and will... Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and P... |
cena:
410,09 |
![]() |
Quality of Service in Optical Burst Switched Networks
ISBN: 9780387341606 / Angielski / Twarda / 198 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Optical Burst Switching (OBS) is a very promising switching technique to support huge bandwidth requirements in optical backbone networks that use Wavelength Division Multiplexing (WDM). This book will be devoted to a comprehensive discussion on the quality of service (QoS) issues and mechanisms to provide QoS in OBS networks. This book is intended for researchers, senior undergraduate and graduate students in the field of optical networking in particular, and networking in general. Optical Burst Switching (OBS) is a very promising switching technique to support huge bandwidth requirements in optical backbone networks that use ... |
cena:
410,09 |
![]() |
Privacy-Respecting Intrusion Detection
ISBN: 9780387343464 / Angielski / Twarda / 307 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties in evaluating a system to determine if it provided the necessary security for particular applications. The Anderson Report, published in 1972, was the outcome of an Air Force Planning Study whose intent was to de?ne the research and development paths required to make secure computers a reality in the USAF. A major contribution of this report was the de?nition of the reference monitor concept,...
Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for...
|
cena:
410,09 |
![]() |
From Model-Driven Design to Resource Management for Distributed Embedded Systems: IFIP TC 10 Working Conference on Distributed and Parallel Embedded S
ISBN: 9780387393612 / Angielski / Twarda / 274 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. From Model-Driven Design to Resource Management for Distributed Embedded Systems presents 16 original contributions and 12 invited papers presented at the Working Conference on Distributed and Parallel Embedded Systems - DIPES 2006, sponsored by the International Federation for Information Processing - IFIP. Coverage includes model-driven design, testing and evolution of embedded systems, timing analysis and predictability, scheduling, allocation, communication and resource management in distributed real-time systems. From Model-Driven Design to Resource Management for Distributed Embedded Systems presents 16 original contributions and 12 invited papers presented... |
cena:
410,09 |
![]() |
Practical Internet Security
ISBN: 9780387405339 / Angielski / Twarda / 536 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their... As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, compet... |
cena:
410,09 |
![]() |
Preserving Privacy in On-Line Analytical Processing (Olap)
ISBN: 9780387462738 / Angielski / Twarda / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret. Second, analytical queries about the data must be allowed for decision support purposes. The main challenge is that sensitive data can be inferred from answers to seemingly innocent aggregations of the data. This volume reviews a series of methods that can precisely answer data cube-style OLAP, regarding... Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OL... |
cena:
410,09 |
![]() |
Network-Aware Security for Group Communications
ISBN: 9780387688466 / Angielski / Twarda / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcasts and the delivery of network control messages, will rely upon the ability to reliably deliver data simultaneously to a large group of users. As these networks become increasingly pervasive and these multi-user services become increasingly ubiquitous, it will become essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group... Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcas... |
cena:
410,09 |
![]() |
Bandwidth Extension of Speech Signals
ISBN: 9780387688985 / Angielski / Twarda / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Bandwidth Extension of Speech Signals describes the theory and methods for quality enhancement of clean speech signals and distorted speech signals such as those that have undergone a band limitation, for instance, in a telephone network. Problems and the respective solutions are discussed for the different approaches. The different approaches are evaluated and a real-time implementation of the most promising approach is presented. The book includes topics related to speech coding, pattern- / speech recognition, speech enhancement, statistics and digital signal processing in general. Bandwidth Extension of Speech Signals describes the theory and methods for quality enhancement of clean speech signals and distorted speech signals... |
cena:
410,09 |
![]() |
Moving Wearables Into the Mainstream: Taming the Borg
ISBN: 9780387691398 / Angielski / Twarda / 412 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Joseph Dvorak has over 10 years experience in wearable technology and design. He led the Conformables project at Motorola which researched highly wearable and easy to use devices and applications. He was the Motorola Scientist in Residence at the MIT Media Lab from 2005 - 2007. He is an Adjunct Professor at Florida Atlantic University where he teaches courses in wearable technology and systems. He holds 14 patents in wearable technology. He is currently the Technology Futurist in the Motorola Corporate Technology Office. He has a PhD in Computer Science from the University of Illinois at... Joseph Dvorak has over 10 years experience in wearable technology and design. He led the Conformables project at Motorola which researched highly w... |
cena:
410,09 |
![]() |
Sequence Data Mining
ISBN: 9780387699363 / Angielski / Twarda / 150 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Understanding sequence data, and the ability to utilize this hidden knowledge, will create a significant impact on many aspects of our society. Examples of sequence data include DNA, protein, customer purchase history, web surfing history, and more. This book provides thorough coverage of the existing results on sequence data mining as well as pattern types and associated pattern mining methods. It offers balanced coverage on data mining and sequence data analysis, allowing readers to access the state-of-the-art results in one place. Understanding sequence data, and the ability to utilize this hidden knowledge, will create a significant impact on many aspects of our society. Exa... |
cena:
410,09 |
![]() |
Social Networks and the Semantic Web
ISBN: 9780387710006 / Angielski / Twarda / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Science is like a tree: contrary to popular belief, both trees and science grow at their edges, not at their core. For science, this means that most of the fruitful and exciting developments are not happening at the core of established ?elds, but are instead happening at the boundaries between such ?elds. This has been particularly true for Computer Science. The most interesting database developments don t happen inside the Database community, but rather where databases hit Biology. Similarly, the most interesting developments in Ar- ?cial Intelligence in recent years have happened where AI...
Science is like a tree: contrary to popular belief, both trees and science grow at their edges, not at their core. For science, this means that most o...
|
cena:
410,09 |