You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
The book is a collection of high-quality peer-reviewed research papers presented at the Fourth International Conference on Innovations in Computer Science and Engineering (ICICSE 2016) held at Guru Nanak Institutions, Hyderabad, India during 22 – 23 July 2016. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academic and industry present their original work and exchange ideas, information, techniques and applications in the field of data science and analytics, artificial intelligence and expert systems, mobility, cloud computing, network security, and emerging technologies.
This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16–20, 2023. The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains.
This book gathers high-quality papers presented at the First International Conference on Sustainable Technologies for Computational Intelligence (ICTSCI 2019), which was organized by Sri Balaji College of Engineering and Technology, Jaipur, Rajasthan, India, on March 29–30, 2019. It covers emerging topics in computational intelligence and effective strategies for its implementation in engineering applications.
Now a SHOWTIME® original series starring Emmy winners Joseph Gordon-Levitt and Kyle Chandler and Academy Award nominee Uma Thurman. Now streaming – Only on SHOWTIME. Named one of the best books of the year by NPR, Fortune, Bloomberg, Sunday Times A New York Times Book Review Editor’s Choice “If you want to understand modern-day Silicon Valley, you need to read this book.” —John Carreyrou, New York Times best-selling author of Bad Blood Hailed as the definitive book on Uber and Silicon Valley, Super Pumped is an epic story of ambition and deception, obscene wealth, and bad behavior that explores how blistering technological and financial innovation culminated in one of the most catastrophic twelve-month periods in American corporate history. Backed by billions in venture capital dollars and led by a brash and ambitious founder, Uber promised to revolutionize the way we move people and goods through the world. What followed would become a corporate cautionary tale about the perils of startup culture and a vivid example of how blind worship of startup founders can go wildly wrong.
Volume IV of the Transactions on Rough Sets (TRS) introduces a number of new advances in the theory and application of rough sets. Rough sets and - proximationspaceswereintroducedmorethan30yearsagobyZdzis lawPawlak. These advances have profound implications in a number of research areas such as the foundations of rough sets, approximate reasoning, arti?cial intelligence, bioinformatics,computationalintelligence, cognitivescience, intelligentsystems, datamining,machineintelligence,andsecurity. Inaddition,itisevidentfromthe papers included in this volume that the foundations and applications of rough sets is a very active research area worldwide. A total of 16 researchers from 7 countries are ...
In recent years, binary code analysis, i.e., applying program analysis directly at the machine code level, has become an increasingly important topic of study. This is driven to a large extent by the information security community, where security auditing of closed-source software and analysis of malware are important applications. Since most of the high-level semantics of the original source code are lost upon compilation to executable code, static analysis is intractable for, e.g., fine-grained information flow analysis of binary code. Dynamic analysis, however, does not suffer in the same way from reduced accuracy in the absence of high-level semantics, and is therefore also more readily ...
The increasing adoption of Business Process Management (BPM) has inspired pioneering software architects and developers to effectively leverage BPM-based software and process-centric architecture (PCA) to create software systems that enable essential business processes. Reflecting this emerging trend and evolving field, Process-Centric Architecture
The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.
About the Book ‘Two classrooms in this school double up as a night hostel for students whose parents migrate seasonally so that they do not miss school.’ For a large majority of Indian children, their only chance of an education is the government school. For nearly two decades, S. Giridhar has been crisscrossing the country in the course of his work with the Azim Premji Foundation, travelling to remote corners and observing the public education system. In these years, he has met hundreds of government school teachers—profoundly committed to improving the lives of the children in their care. These are teachers who defy all constraints because of a burning belief that every child can learn. Ordinary People, Extraordinary Teachers has emerged from Giridhar’s in-depth study of these inspirational teachers and the ecosystem they function in. Innovative and creative, dogged and resourceful, firm and kind—the government school teacher wears many a hat. This book is a tribute to their commitment and resilience.