Télécharger le livre :  Twitter Data Analytics
Ajouter à ma liste d'envies
This brief provides methods for harnessing Twitter data to discover solutions to complex inquiries. The brief introduces the process of collecting data through Twitter’s APIs and offers strategies for curating large datasets. The text gives examples of Twitter data with...

Editeur : Springer
Parution : 2013-11-11
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Distributed Denial of Service Attack and Defense
Ajouter à ma liste d'envies
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also...

Editeur : Springer
Parution : 2013-11-04
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Security Assessment in Vehicular Networks
Ajouter à ma liste d'envies
This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which...

Editeur : Springer
Parution : 2013-10-29
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Bluetooth Security Attacks
Ajouter à ma liste d'envies
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview ofBluetooth security. They examine network vulnerabilities...

Editeur : Springer
Parution : 2013-10-28
Collection : SpringerBriefs in Computer Science
ePub

63,29
Télécharger le livre :  Concise Computer Mathematics
Ajouter à ma liste d'envies
Adapted from a modular undergraduate course on computational mathematics, Concise Computer Mathematics delivers an easily accessible, self-contained introduction to the basic notions of mathematics necessary for a computer science degree. The text reflects the need to...

Editeur : Springer
Parution : 2013-10-28
Collection : SpringerBriefs in Computer Science
ePub

68,56
Télécharger le livre :  Sentiment Analysis for PTSD Signals
Ajouter à ma liste d'envies
This book describes a computational framework for real-time detection of psychological signals related to Post-Traumatic Stress Disorder (PTSD) in online text-based posts, including blogs and web forums. Further, it explores how emerging computational techniques such as...

Editeur : Springer
Parution : 2013-10-25
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Unsupervised Information Extraction by Text Segmentation
Ajouter à ma liste d'envies
A new unsupervised approach to the problem of Information Extraction by Text Segmentation (IETS) is proposed, implemented and evaluated herein. The authors’ approach relies on information available on pre-existing data to learn how to associate segments in the input...

Editeur : Springer
Parution : 2013-10-23
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Location Privacy Protection in Mobile Networks
Ajouter à ma liste d'envies
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile...

Editeur : Springer
Parution : 2013-10-17
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Resource Management in Utility and Cloud Computing
Ajouter à ma liste d'envies
This SpringerBrief reviews the existing market-oriented strategies for economically managing resource allocation in distributed systems. It describes three new schemes that address cost-efficiency, user incentives, and allocation fairness with regard to different...

Editeur : Springer
Parution : 2013-10-17
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Spatio-Temporal Databases
Ajouter à ma liste d'envies
This brief presents several new query processing techniques, called complex motion pattern queries, specifically designed for very large spatio-temporal databases of moving objects. The brief begins with the definition of flexible pattern queries, which are powerful...

Editeur : Springer
Parution : 2013-10-15
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Security and Privacy in Mobile Social Networks
Ajouter à ma liste d'envies
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two...

Editeur : Springer
Parution : 2013-10-12
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Distributed Hash Table
Ajouter à ma liste d'envies
This SpringerBrief summarizes the development of Distributed Hash Table in both academic and industrial fields. It covers the main theory, platforms and applications of this key part in distributed systems and applications, especially in large-scale distributed...

Editeur : Springer
Parution : 2013-10-08
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Sustainable Wireless Networks
Ajouter à ma liste d'envies
This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for...

Editeur : Springer
Parution : 2013-10-07
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Cyber Security
Ajouter à ma liste d'envies
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on...

Editeur : Springer
Parution : 2013-10-04
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Cognitive Virtual Network Operator Games
Ajouter à ma liste d'envies
This SpringerBrief provides an overview of cognitive mobile virtual network operator’s (C-MVNO) decisions under investment flexibility, supply uncertainty, and market competition in cognitive radio networks.This is a new research area at the nexus of cognitive radio...

Editeur : Springer
Parution : 2013-10-04
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  4G Femtocells
Ajouter à ma liste d'envies
This brief examines resource allocation and interference management for 4G femtocells. It introduces 4G femtocells in the context of 4G mobile networks and discusses related technical challenges in resource allocation and interference management. Topics include ant...

Editeur : Springer
Parution : 2013-10-01
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
Ajouter à ma liste d'envies
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11™ based wireless networks,IP-based multimedia communications over wireless networks are also drawing extensive attention in both academia...

Editeur : Springer
Parution : 2013-09-27
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Data Center Networks
Ajouter à ma liste d'envies
This SpringerBrief presents a survey of data center network designs and topologies and compares several properties in order to highlight their advantages and disadvantages. The brief also explores several routing protocols designed for these topologies and compares the...

Editeur : Springer
Parution : 2013-09-26
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  A Brief History of Cryptology and Cryptographic Algorithms
Ajouter à ma liste d'envies
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems.The conflict between these two halves of cryptology is the story of secret writing....

Editeur : Springer
Parution : 2013-09-24
Collection : SpringerBriefs in Computer Science
ePub

52,74
Télécharger le livre :  Middleware Solutions for the Internet of Things
Ajouter à ma liste d'envies
After a brief introduction and contextualization on the Internet of Things (IoT) and Web of Things (WoT) paradigms, this timely new book describes one of the first research initiatives aimed at tackling the several challenges involved in building a middleware-layer...

Editeur : Springer
Parution : 2013-09-21
Collection : SpringerBriefs in Computer Science
ePub

52,74
<< < 7891011 >