Download or read book 2023 IEEE 43rd International Conference on Distributed Computing Systems ICDCS written by and published by . This book was released on with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Proceedings of the International Symposium on Intelligent Computing and Networking 2024 written by Michel Kadoch and published by Springer Nature. This book was released on with total page 436 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Advanced Intelligent Computing Technology and Applications written by De-Shuang Huang and published by Springer Nature. This book was released on with total page 548 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Web Information Systems and Applications written by Cheqing Jin and published by Springer Nature. This book was released on with total page 624 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Database Systems for Advanced Applications written by Makoto Onizuka and published by Springer Nature. This book was released on with total page 564 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Advances in Cryptology CRYPTO 2023 written by Helena Handschuh and published by Springer Nature. This book was released on 2023-08-08 with total page 792 pages. Available in PDF, EPUB and Kindle. Book excerpt: The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023. The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.
Download or read book 5G Enabled Technology for Smart City and Urbanization System written by Susheela Hooda and published by CRC Press. This book was released on 2024-12-04 with total page 294 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book examines the applications, trends and challenges of 5G Enabled technologies for Smart City and Urbanization systems. It addresses the challenges to bringing such capabilities of 5G-enabled technologies for smart cities and urbanisation into practice by presenting the theoretical as well as technical research outcomes with case studies. It covers key areas, including smart building, smart health care, smart mobility, smart living, smart surveillance, and IOT-based systems. It explains how these systems are connected using different technologies that support 5G access and control protocols. • Offers a comprehensive understanding of the emergence of 5G technology and its integration with IoT, Big Data, and Artificial Intelligence for smart city and urbanisation • Focuses on useful applications of Smart City and Urbanization, which can enhance different aspects of urban life • Explores the advantages of using massive IoT and predictive analytics approaches in smart cities • IoT, Bigdata, Deep learning and machine learning techniques are explained to fuel smart city and Urbanization system • Addresses both theoretical and technical research outcomes related to smart city and urbanisation with 5G technology. It serves as a valuable reference for graduate students, researchers, and m practitioners seeking to deepen their knowledge and engage with the latest advancements in the areas of Smart cities and Urbanization systems.
Download or read book Web and Big Data written by Wenjie Zhang and published by Springer Nature. This book was released on with total page 526 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Structural Information and Communication Complexity written by Sergio Rajsbaum and published by Springer Nature. This book was released on 2023-05-24 with total page 606 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the 30th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2023, held in Alcalá de Henares, Spain, during June 6–9, 2023. The 26 full papers presented in this book were carefully reviewed and selected from 48 submissions. SIROCCO is devoted to the study of the interplay between structural knowledge, communication, and computing in decentralized systems of multiple communicating entities. Special emphasis is given to innovative approaches leading to better understanding of the relationship between computing and communication. This is the 30th edition of SIROCCO, and 3 of the 26 papers in this book are devoted to celebrating this fact, plus an additional paper about a recent trend to study special models of computation.
Download or read book Handbook of Artificial Intelligence written by Dumpala Shanthi and published by Bentham Science Publishers. This book was released on 2023-11-13 with total page 297 pages. Available in PDF, EPUB and Kindle. Book excerpt: Artificial Intelligence (AI) is an interdisciplinary science with multiple approaches to solve a problem. Advancements in machine learning (ML) and deep learning are creating a paradigm shift in virtually every tech industry sector. This handbook provides a quick introduction to concepts in AI and ML. The sequence of the book contents has been set in a way to make it easy for students and teachers to understand relevant concepts with a practical orientation. This book starts with an introduction to AI/ML and its applications. Subsequent chapters cover predictions using ML, and focused information about AI/ML algorithms for different industries (health care, agriculture, autonomous driving, image classification and segmentation, SEO, smart gadgets and security). Each industry use-case demonstrates a specific aspect of AI/ML techniques that can be used to create pipelines for technical solutions such as data processing, object detection, classification and more. Additional features of the book include a summary and references in every chapter, and several full-color images to visualize concepts for easy understanding. It is an ideal handbook for both students and instructors in undergraduate level courses in artificial intelligence, data science, engineering and computer science who are required to understand AI/ML in a practical context.
Download or read book Machine Learning Empowered Intelligent Data Center Networking written by Ting Wang and published by Springer Nature. This book was released on 2023-02-21 with total page 123 pages. Available in PDF, EPUB and Kindle. Book excerpt: An Introduction to the Machine Learning Empowered Intelligent Data Center Networking Fundamentals of Machine Learning in Data Center Networks. This book reviews the common learning paradigms that are widely used in data centernetworks, and offers an introduction to data collection and data processing in data centers. Additionally, it proposes a multi-dimensional and multi-perspective solution quality assessment system called REBEL-3S. The book offers readers a solid foundation for conducting research in the field of AI-assisted data center networks. Comprehensive Survey of AI-assisted Intelligent Data Center Networks. This book comprehensively investigates the peer-reviewed literature published in recent years. The wide range of machine learning techniques is fully reflected to allow fair comparisons. In addition, the book provides in-depth analysis and enlightening discussions on the effectiveness of AI in DCNs from various perspectives, covering flow prediction, flow classification, load balancing, resource management, energy management, routing optimization, congestion control, fault management, and network security. Provides a Broad Overview with Key Insights. This book introduces several novel intelligent networking concepts pioneered by real-world industries, such as Knowledge Defined Networks, Self-Driving Networks, Intent-driven Networks and Intent-based Networks. Moreover, it shares unique insights into the technological evolution of the fusion of artificial intelligence and data center networks, together with selected challenges and future research opportunities.
Download or read book Machine Learning Techniques for Cybersecurity written by Elisa Bertino and published by Springer Nature. This book was released on 2023-04-08 with total page 169 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions. While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks.
Download or read book Multi dimensional Urban Sensing Using Crowdsensing Data written by Chaocan Xiang and published by Springer Nature. This book was released on 2023-03-23 with total page 204 pages. Available in PDF, EPUB and Kindle. Book excerpt: Chaocan Xiang is an Associate Professor at the College of Computer Science, Chongqing University, China. He received his bachelor’s degree and Ph.D. from Nanjing Institute of Communication Engineering, China, in 2009 and 2014, respectively. He subsequently studied at the University of Michigan-Ann Arbor in 2017 (supervised by Prof. Kang G. Shin, IEEE Life Fellow, ACM Fellow). His research interests mainly include UAVs/vehicle-based crowdsensing, urban computing, Internet of Things, Artificial Intelligence, and big data. He has published more than 50 papers, including over 20 in leading venues such as IEEE Transactions on Mobile Computing, IEEE Transactions on Parallel and Distributed Systems, IEEE INFOCOM, and ACM Ubicomp. He has received a best paper award and a best poster award at two international conferences. Panlong Yang is a full Professor at the University of Science and Technology of China. He has been supported by the NSF Jiangsu through a Distinguished Young Scholarship and was honored as a CCF Distinguished Lecturer in 2015. He has published over 150 papers, including 40 in CCF Class A. Since 2012, he has supervised 14 master’s and Ph.D. candidates, including two excellent dissertation winners in Jiangsu Province and the PLA education system. He has been supported by the National Key Development Project and NSFC projects. He has nominated by ACM MobiCom 2009 for the best demo honored mention awards, and won best paper awards at the IEEE MSN and MASS. He has served as general chair of BigCom and TPC chair of IEEE MSN. In addition, he has served as a TPC member of INFOCOM (CCF Class A) and an associate editor of the Journal of Communication of China. He is a Senior Member of the IEEE (2019). Fu Xiao received his Ph.D. in Computer Science and Technology from the Nanjing University of Science and Technology, Nanjing, China, in 2007. He is currently a Professor and Dean of the School of Computer, Nanjing University of Posts and Telecommunications. He has authored more than 60 papers in respected conference proceedings and journals, including IEEE INFOCOM, ACM Mobihoc, IEEE JASC, IEEE/ACM ToN, IEEE TPDS, IEEE TMC, etc. His main research interest is in the Internet of Things. He is a member of the IEEE Computer Society and the Association for Computing Machinery. Xiaochen Fan received his B.S. degree in Computer Science from Beijing Institute of Technology, Beijing, China, in 2013, and his Ph.D. from the University of Technology Sydney, NSW, Australia, in 2021. His research interests include mobile/pervasive computing, deep learning, and Internet of Things (IoT). He has published over 25 peer-reviewed papers in high-quality journals and IEEE/ACM international conference proceedings.
Download or read book Cyber Foraging written by Jason Flinn and published by Springer Nature. This book was released on 2022-06-01 with total page 93 pages. Available in PDF, EPUB and Kindle. Book excerpt: This lecture provides an introduction to cyber foraging, a topic that lies at the intersection of mobile and cloud computing. Cyber foraging dynamically augments the computing resources of mobile computers by opportunistically exploiting fixed computing infrastructure in the surrounding environment. In a cyber foraging system, applications functionality is dynamically partitioned between the mobile computer and infrastructure servers that store data and execute computation on behalf of mobile users. The location of application functionality changes in response to user mobility, platform characteristics, and variation in resources such as network bandwidth and CPU load. Cyber foraging also introduces a new, surrogate computing tier that lies between mobile users and cloud data centers. Surrogates are wired, infrastructure servers that offer much greater computing resources than those offered by small, battery-powered mobile devices. Surrogates are geographically distributed to be as close as possible to mobile computers so that they can provide substantially better response time to network requests than that provided by servers in cloud data centers. For instance, surrogates may be co-located with wireless hotspots in coffee shops, airport lounges, and other public locations. This lecture first describes how cyber foraging systems dynamically partition data and computation. It shows how dynamic partitioning can often yield better performance, energy efficiency, and application quality than static thin-client or thick-client approaches for dividing functionality between cloud and mobile computers. The lecture then describes the design of the surrogate computing tier. It shows how strong isolation can enable third-party computers to host computation and store data on behalf of nearby mobile devices. It then describes how surrogates can provide reasonable security and privacy guarantees to the mobile computers that use them. The lecture concludes with a discussion of data staging, in which surrogates temporarily store data in transit between cloud servers and mobile computers in order to improve transfer bandwidth and energy efficiency. Table of Contents: Introduction / Partitioning / Management / Security and Privacy / Data Staging / Challenges and Opportunities
Download or read book Peer to Peer Systems written by Peter Druschel and published by Springer Science & Business Media. This book was released on 2002-10-09 with total page 348 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Peer-to-Peer Systems, IPTPS 2002, held in Cambridge, MA, USA, in March 2002. The 30 revised full papers presented together with an introductory survey article were carefully selected and improved during two rounds of reviewing and revision. The book is a unique state-of-the-art survey on the emerging field of peer-to-peer computing. The papers are organized in topical sections on structure overlay routing protocols, deployed peer-to-peer systems, anonymous overlays, applications, evaluation, searching and indexing, and data management.
Download or read book Social Sensing written by Dong Wang and published by Morgan Kaufmann. This book was released on 2015-04-17 with total page 232 pages. Available in PDF, EPUB and Kindle. Book excerpt: Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field of social sensing, emphasizing the key problem faced by application designers: how to extract reliable information from data collected from largely unknown and possibly unreliable sources. The book explains how a myriad of societal applications can be derived from this massive amount of data collected and shared by average individuals. The title offers theoretical foundations to support emerging data-driven cyber-physical applications and touches on key issues such as privacy. The authors present solutions based on recent research and novel ideas that leverage techniques from cyber-physical systems, sensor networks, machine learning, data mining, and information fusion. Offers a unique interdisciplinary perspective bridging social networks, big data, cyber-physical systems, and reliability Presents novel theoretical foundations for assured social sensing and modeling humans as sensors Includes case studies and application examples based on real data sets Supplemental material includes sample datasets and fact-finding software that implements the main algorithms described in the book
Download or read book Mean Field Games written by Yves Achdou and published by Springer Nature. This book was released on 2021-01-19 with total page 316 pages. Available in PDF, EPUB and Kindle. Book excerpt: This volume provides an introduction to the theory of Mean Field Games, suggested by J.-M. Lasry and P.-L. Lions in 2006 as a mean-field model for Nash equilibria in the strategic interaction of a large number of agents. Besides giving an accessible presentation of the main features of mean-field game theory, the volume offers an overview of recent developments which explore several important directions: from partial differential equations to stochastic analysis, from the calculus of variations to modeling and aspects related to numerical methods. Arising from the CIME Summer School "Mean Field Games" held in Cetraro in 2019, this book collects together lecture notes prepared by Y. Achdou (with M. Laurière), P. Cardaliaguet, F. Delarue, A. Porretta and F. Santambrogio. These notes will be valuable for researchers and advanced graduate students who wish to approach this theory and explore its connections with several different fields in mathematics.