Télécharger le livre :  Security-aware Cooperation in Cognitive Radio Networks
Ajouter à ma liste d'envies
This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission...

Editeur : Springer
Parution : 2014-01-29
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Integrating 3D Modeling, Photogrammetry and Design
Ajouter à ma liste d'envies
This book looks at the convergent nature of technology and its relationship to the field of photogrammetry and 3D design.This is a facet of a broader discussion of the nature of technology itself and the relationship of technology to art, as well as an examination of...

Editeur : Springer
Parution : 2014-01-28
Collection : SpringerBriefs in Computer Science
ePub

63,29
Télécharger le livre :  Human Action Recognition with Depth Cameras
Ajouter à ma liste d'envies
Action recognition technology has many real-world applications in human-computer interaction, surveillance, video retrieval, retirement home monitoring, and robotics. The commoditization of depth sensors has also opened up further applications that were not feasible...

Editeur : Springer
Parution : 2014-01-25
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Location Privacy Preservation in Cognitive Radio Networks
Ajouter à ma liste d'envies
This brief focuses on the current research on location privacy preservation in cognitive radio networks (CRNs). Along with a review of the existing works, this book includes fundamental privacy models, possible frameworks, useful performance, and future research...

Editeur : Springer
Parution : 2014-01-18
Collection : SpringerBriefs in Computer Science
ePub

52,24
Télécharger le livre :  Information-Theoretic Evaluation for Computational Biomedical Ontologies
Ajouter à ma liste d'envies
The development of effective methods for the prediction of ontological annotations is an important goal in computational biology, yet evaluating their performance is difficult due to problems caused by the structure of biomedical ontologies and incomplete annotations of...

Editeur : Springer
Parution : 2014-01-09
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Open Problems in Spectral Dimensionality Reduction
Ajouter à ma liste d'envies
The last few years have seen a great increase in the amount of data available to scientists, yet many of the techniques used to analyse this data cannot cope with such large datasets. Therefore, strategies need to be employed as a pre-processing step to reduce the...

Editeur : Springer
Parution : 2014-01-07
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  JRuby Rails Web Application Development
Ajouter à ma liste d'envies
This SpringerBrief explains how to create a Rails web application with JRuby, a 100% Java implementation for Ruby.This brief demonstrates how Oracle® WebLogic servers and JBoss® application servers deploy the JRuby application, how JRuby runs on the Java® Virtual...

Editeur : Springer
Parution : 2014-01-06
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Collaborative Web Hosting
Ajouter à ma liste d'envies
This brief presents a peer-to-peer (P2P) web-hosting infrastructure (named pWeb) that can transform networked, home-entertainment devices into lightweight collaborating Web servers for persistently storing and serving multimedia and web content. The issues addressed...

Editeur : Springer
Parution : 2014-01-04
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Data-driven Generation of Policies
Ajouter à ma liste d'envies
This Springer Brief presents a basic algorithm that provides a correct solution to finding an optimal state change attempt, as well as an enhanced algorithm that is built on top of the well-known trie data structure. It explores correctness and algorithmic complexity...

Editeur : Springer
Parution : 2014-01-04
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Countering Brandjacking in the Digital Age
Ajouter à ma liste d'envies
The rise of the Internet and social media in particular offer great opportunities for brand owners to increase business and brand recognition. While this has clearly been of benefit to brand owners, who have seen a consequent rise in the value of their brands, it...

Editeur : Springer
Parution : 2013-11-26
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Twitter Data Analytics
Ajouter à ma liste d'envies
This brief provides methods for harnessing Twitter data to discover solutions to complex inquiries. The brief introduces the process of collecting data through Twitter’s APIs and offers strategies for curating large datasets. The text gives examples of Twitter data with...

Editeur : Springer
Parution : 2013-11-11
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Distributed Denial of Service Attack and Defense
Ajouter à ma liste d'envies
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also...

Editeur : Springer
Parution : 2013-11-04
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Security Assessment in Vehicular Networks
Ajouter à ma liste d'envies
This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which...

Editeur : Springer
Parution : 2013-10-29
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Bluetooth Security Attacks
Ajouter à ma liste d'envies
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview ofBluetooth security. They examine network vulnerabilities...

Editeur : Springer
Parution : 2013-10-28
Collection : SpringerBriefs in Computer Science
ePub

63,29
Télécharger le livre :  Concise Computer Mathematics
Ajouter à ma liste d'envies
Adapted from a modular undergraduate course on computational mathematics, Concise Computer Mathematics delivers an easily accessible, self-contained introduction to the basic notions of mathematics necessary for a computer science degree. The text reflects the need to...

Editeur : Springer
Parution : 2013-10-28
Collection : SpringerBriefs in Computer Science
ePub

68,56
Télécharger le livre :  Sentiment Analysis for PTSD Signals
Ajouter à ma liste d'envies
This book describes a computational framework for real-time detection of psychological signals related to Post-Traumatic Stress Disorder (PTSD) in online text-based posts, including blogs and web forums. Further, it explores how emerging computational techniques such as...

Editeur : Springer
Parution : 2013-10-25
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Unsupervised Information Extraction by Text Segmentation
Ajouter à ma liste d'envies
A new unsupervised approach to the problem of Information Extraction by Text Segmentation (IETS) is proposed, implemented and evaluated herein. The authors’ approach relies on information available on pre-existing data to learn how to associate segments in the input...

Editeur : Springer
Parution : 2013-10-23
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Location Privacy Protection in Mobile Networks
Ajouter à ma liste d'envies
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile...

Editeur : Springer
Parution : 2013-10-17
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Resource Management in Utility and Cloud Computing
Ajouter à ma liste d'envies
This SpringerBrief reviews the existing market-oriented strategies for economically managing resource allocation in distributed systems. It describes three new schemes that address cost-efficiency, user incentives, and allocation fairness with regard to different...

Editeur : Springer
Parution : 2013-10-17
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Spatio-Temporal Databases
Ajouter à ma liste d'envies
This brief presents several new query processing techniques, called complex motion pattern queries, specifically designed for very large spatio-temporal databases of moving objects. The brief begins with the definition of flexible pattern queries, which are powerful...

Editeur : Springer
Parution : 2013-10-15
Collection : SpringerBriefs in Computer Science
ePub

52,74
<< < 1011121314 >