You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed post-conference proceedings of the 11th EAI International Conference on Research in Computer science and its Applications, CNRIA 2021, held in June 2021. Due to COVID-19 pandemic the conference was held virtually. The 11 full papers presented were selected from 24 submissions and issue different problems in underserved and unserved areas. The papers are arranged in 3 tracks: data science and artificial intelligence; telecom and artificial intelligence; IoT and ICT applications.
This book constitutes the refereed proceedings of the First International Conference on Decision and Game Theory for Security, GameSec 2010, held in Berlin, Germany, in November 2010. The 12 revised full papers and 6 revised short papers presented were carefully reviewed and selected from numerous submissions and focus on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. The papers are organized in topical sections on security investments and planning, privacy and anonymity, adversarial and robust control, network security and botnets, authorization and authentication, as well as theory and algorithms for security.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Pan-African Intelligence and Smart Systems, PAAISS 2022, which was held in Dakar, Senegal, in November 2022. The 27 revised full papers presented were carefully selected from 70 submissions. The theme of PAAISS 2022 was: IoT and Enabling Smart System Technologies, Special Topics of African Interest, Artificial Intelligence Theory and Methods, Artificial Intelligence Applications in Medicine, Remote sensing and AI in Agriculture, AI applications and Smart Systems technologies, Affective Computing, Intelligent Transportation systems.
This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.
This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for Security, GameSec 2013, held in Fort Worth, TX, USA, in November 2013. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. The conference focuses on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. At the same time, the connection between theoretical models and real world security problems are emphasized to establish the important feedback loop between theory and practice. Observing the scarcity of venues for researchers who try to develop a deeper theoretical understanding of the underlying incentive and resource allocation issues in security, we believe that GameSec will fill an important void and serve as a distinguished forum of highest standards for years to come.
This book primarily focuses on the African Sahel region, shedding new light on the epidemiology, socio-economics, clinical manifestations and control approaches of transboundary animal diseases (TADs) in this specific region. In addition to the description of TADs in Sahelian Africa and connected regions, several issues regarding the burden of TADs, the role of national/regional/international veterinary organizations in the surveillance process, animal mobility, one health and TADs in the dromedary are discussed. The book contains 22 chapters and is structured in three parts, i- general features and commonalities, ii- viral diseases, iii- bacterial diseases. Each chapter was written by a group of experts specialized in the topic. This work will be of general interest to researchers, veterinarians, veterinary public health officers, and students engaged in the surveillance and control of animal infectious diseases, included those of zoonotic nature and that are prevalent in the Sahel.
This book gathers papers on interactive and collaborative mobile learning environments, assessment, evaluation and research methods in mobile learning, mobile learning models, theory and pedagogy, open and distance mobile learning, life-long and informal learning using mobile devices, wearables and the Internet of Things, game-based learning, dynamic learning experiences, mobile systems and services for opening up education, mobile healthcare and training, case studies on mobile learning, and 5G network infrastructure. Today, interactive mobile technologies have become the core of many—if not all—fields of society. Not only do the younger generation of students expect a mobile working an...
This book constitutes the refereed proceedings of the 29th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2015, held in Fairfax, VA, USA, in July 2015. The 18 revised full papers and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: data anonymization and computation; access control and authorization; user privacy; authentication and information integration; privacy and trust; access control and usage policies; network and internet security; and information flow and inference.
This book is written for computer engineers and scientists active in the development of software and hardware systems. It supplies the understanding and tools needed to effectively evaluate the performance of individual computer and communication systems. It covers the theoretical foundations of the field as
With the fast development of networking and software technologies, information processing infrastructure and applications have been growing at an impressive rate in both size and complexity, to such a degree that the design and development of high performance and scalable data processing systems and networks have become an ever-challenging issue. As a result, the use of performance modeling and m- surementtechniquesas a critical step in designand developmenthas becomea c- mon practice. Research and developmenton methodologyand tools of performance modeling and performance engineering have gained further importance in order to improve the performance and scalability of these systems. Since th...