Télécharger le livre :  Traceback and Anonymity
Ajouter à ma liste d'envies
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the...

Editeur : Springer
Parution : 2015-11-18
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
Ajouter à ma liste d'envies
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal...

Editeur : Springer
Parution : 2015-11-05
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Parallel and Distributed Map Merging and Localization
Ajouter à ma liste d'envies
This work examines the challenges of distributed map merging and localization in multi-robot systems, which enables robots to acquire the knowledge of their surroundings needed to carry out coordinated tasks. After identifying the main issues associated with this...

Editeur : Springer
Parution : 2015-10-31
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Interpretability of Computational Intelligence-Based Regression Models
Ajouter à ma liste d'envies
The key idea of this book is that hinging hyperplanes, neural networks and support vector machines can be transformed into fuzzy models, and interpretability of the resulting rule-based systems can be ensured by special model reduction and visualization techniques.The...

Editeur : Springer
Parution : 2015-10-22
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Enhanced Building Information Models
Ajouter à ma liste d'envies
This book explains how to combine and exploit sensor networks and internet-of-things (IoT) technologies and Web-service design patterns to enrich and integrate Building Information Models (BIMs). It provides approaches and software architectures for facilitating the...

Editeur : Springer
Parution : 2015-10-01
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Cyber-Risk Management
Ajouter à ma liste d'envies
This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial...

Editeur : Springer
Parution : 2015-10-01
Collection : SpringerBriefs in Computer Science
PDF

79,11
Télécharger le livre :  Diffusion in Social Networks
Ajouter à ma liste d'envies
This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping...

Editeur : Springer
Parution : 2015-09-16
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Spatial Auditory Human-Computer Interfaces
Ajouter à ma liste d'envies
This book focuses on a special group of auditory interfaces using spatial sound for the representation of information. The addition of information on the location of a selected sound source or a group of sources shows many advantages over a mere single-channel audio....

Editeur : Springer
Parution : 2015-09-03
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Encrypted Email
Ajouter à ma liste d'envies
This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection....

Editeur : Springer
Parution : 2015-08-08
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Sublinear Algorithms for Big Data Applications
Ajouter à ma liste d'envies
The brief focuses on applying sublinear algorithms to manage critical big data challenges.The text offers an essential introduction to sublinear algorithms, explaining why they are vital to large scale data systems. It also demonstrates how to apply sublinear algorithms...

Editeur : Springer
Parution : 2015-07-16
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Operators for Similarity Search
Ajouter à ma liste d'envies
This book provides a comprehensive tutorial on similarity operators. The authors systematically survey the set of similarity operators, primarily focusing on their semantics, while also touching upon mechanisms for processing them effectively.The book starts off by...

Editeur : Springer
Parution : 2015-07-07
Collection : SpringerBriefs in Computer Science
PDF

52,74
Télécharger le livre :  Quality-aware Scheduling for Key-value Data Stores
Ajouter à ma liste d'envies
This book comprehensively illustrates quality-ware scheduling in key-value stores. In addition, it provides scheduling strategies and a prototype framework of quality-aware scheduler as well as a demonstration of online applications. The book offers a rich blend of...

Editeur : Springer
Parution : 2015-06-05
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  MAC Protocols for Cyber-Physical Systems
Ajouter à ma liste d'envies
This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into...

Editeur : Springer
Parution : 2015-06-04
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Amplify-and-Forward Relaying in Wireless Communications
Ajouter à ma liste d'envies
This SpringerBrief explores the advantage of relaying techniques in addressing the increasing demand for high data rates and reliable services over the air. It demonstrates how to design cost-effective relay systems that provide high spectral efficiency and fully...

Editeur : Springer
Parution : 2015-05-22
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Delay Tolerant Networks
Ajouter à ma liste d'envies
This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology. As a result, DTNs can be...

Editeur : Springer
Parution : 2015-05-14
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  A Survey of Characteristic Engine Features for Technology-Sustained Pervasive Games
Ajouter à ma liste d'envies
This book scrutinizes pervasive games from a technological perspective, focusing on the sub-domain of games that satisfy the criteria that they make use of virtual game elements. In the computer game industry, the use of a game engine to build games is common, but...

Editeur : Springer
Parution : 2015-05-08
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Real time deforestation detection using ANN and Satellite images
Ajouter à ma liste d'envies
The foremost aim of the present study was the development of a tool to detect daily deforestation in the Amazon rainforest, using satellite images from the MODIS/TERRA sensor and Artificial Neural Networks.The developed tool provides parameterization of the...

Editeur : Springer
Parution : 2015-04-25
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Leakage Resilient Password Systems
Ajouter à ma liste d'envies
This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks...

Editeur : Springer
Parution : 2015-04-23
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Software Sourcing in the Age of Open
Ajouter à ma liste d'envies
This SpringerBrief discusses multiple forms of open-source-inspired outsourcing: opensourcing, innersourcing and crowdsourcing. It uses a framework-based comparison to explain the strengths and weaknesses of each approach. By pointing out characteristics along with...

Editeur : Springer
Parution : 2015-04-21
Collection : SpringerBriefs in Computer Science
PDF, ePub

52,74
Télécharger le livre :  Supercomputing for Molecular Dynamics Simulations
Ajouter à ma liste d'envies
This work presents modern implementations of relevant molecular dynamics algorithms using ls1 mardyn, a simulation program for engineering applications. The text focuses strictly on HPC-related aspects, covering implementation on HPC architectures, taking Intel Xeon and...

Editeur : Springer
Parution : 2015-03-30
Collection : SpringerBriefs in Computer Science
ePub

52,74
<< < 89101112 >