This book constitutes the proceedings of the International Conference on Artificial Intelligence and Mobile Services, AIMS 2018, held as part of SCF 2018, in Seattle, WA, USA, in June 2018.
Phase-Locked Loops for Wireless Communications: Digitial, Analog and Optical Implementations, Second Edition presents a complete tutorial of phase-locked loops from analog implementations to digital and optical designs.
The book, while introducing readers to the auction mechanism for resource provisioning in cloud computing, also endeavors to provide structured literature on the subject.
Welcome to the proceedings of the 4th International Conference on Wired/ Wireless Internet Communications held at the University of Bern from May 10-12,2006.
Expert SharePoint 2010 Practices is a valuable compendium of best practices, tips, and secrets straight from the most knowledgeable SharePoint gurus in the industry.
Computer-based infectious disease surveillance systems are capable of real-time or near real-time detection of serious illnesses and potential bioterrorism agent exposures and represent a major step forward in disease surveillance.
This book constitutes the proceedings of the First International Conference on Science of Cyber Security, SciSec 2018, held in Beijing, China, in August 2018.
This reader-friendly textbook presents a comprehensive overview of the essential aspects of cloud computing, from the origin of the field to the latest developments.
This book constitutes the revised selected papers of the scientific satellite events that were held in conjunction with the 17th International Conference on Service-Oriented Computing, ICSOC 2019, held in Toulouse, France, in October 2019.
Simulation may be defined as the discipline whose objective is to imitate one or more aspects of reality in a way that is as close to that reality as possible; indeed, an apt synonym that is gaining some currency is artificial reality.
This book constitutes the refereed proceedings of the 6th IFIP TC 5 International Conference on Computational Intelligence and Its Applications, CIIA 2018, held in Oran, Algeria, in May 2018.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in October 2016.
The four-volume set LNCS 11070, 11071, 11072, and 11073 constitutes the refereed proceedings of the 21st International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2018, held in Granada, Spain, in September 2018.
This two-volume set, CCIS 2176-2177, constitutes the proceedings from the Second International Conference on Deep Sciences for Computing and Communications, IconDeepCom 2023, held in Chennai, India, in April 2023.
The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18th European Conference on Computer Vision, ECCV 2024, held in Milan, Italy, during September 29-October 4, 2024.
Some of our day-to-day situations dealing with self-organization, mobility management, and energy efficient design directly relate to ad hoc wireless (mobile or static) network applications.
This book constitutes the refereed proceedings of the Second International Workshop, FAIMI 2024, and the Third International Workshop, EPIMI 2024, held in conjunction with MICCAI 2024, Marrakesh, Morocco, in October 2024.
Adaptation, for purposes of self-healing, self-protection, self-management, or self-regulation, is currently considered to be one of the most challenging pr- erties of distributed systems that operate in dynamic, unpredictable, and - tentially hostile environments.
This book constitutes the proceedings of the 29th International Conference on Parallel and Distributed Computing, Euro-Par 2023, held in Limassol, Cyprus, in August/September 2023.
This, the 29th issue of the Transactions on Computational Science journal, is comprised of seven full papers focusing on the area of secure communication.
The ten-volume set LNCS 15016-15025 constitutes the refereed proceedings of the 33rd International Conference on Artificial Neural Networks and Machine Learning, ICANN 2024, held in Lugano, Switzerland, during September 17-20, 2024.
Gain industry best practices from planning to implementing Microsoft Teams and learn how to enable, configure, and integrate user provisioning, management, and monitoring.
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020.
This book introduces the fundamentals of physical layer security (PLS) and demonstrates how a variety of PLS techniques can be applied to improve the security of wireless communication systems.
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such as ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks, mobility and personalization, put new requirements on privacy and security with respect to data management.
This volume contains the proceedings of the International Conference on Inf- mation Computing and Applications (ICICA 2010), which was held in Tangshan, China, October 15-18, 2010.
Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models.
With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and networks.
This book constitutes the refereed proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2018, held in Funchal, Madeira, Portugal, in March 2018.
This book constitutes the refereed proceedings of the Third International Workshop on Chatbot Research and Design, CONVERSATIONS 2019, held in Amsterdam, The Netherlands, in November 2019.
This book constitutes the refereed proceedings of the International Conference on Brain and Health Informatics, BHI 2013, held in Maebashi, Japan, in October 2013.
This book constitutes the refereed proceedings of the 16th International Conference on Software Architecture, ECSA 2022, held in Prague in September 2022.
This book constitutes the refereed proceedings of the 33rd International Conference on Databases Theory and Applications, ADC 2022, held in Sydney, Australia, in September 2022.
Recent years have witnessed the appearance of new paradigms for designing distributed applications where the application components can be relocated - namically across the hosts of the network.
Broadband Fixed Wireless Access provides a systematic overview of the emerging WiMAX technology, and much of the material is based on the practical experiences of the authors in building new systems.
This book constitutes the refereed proceedings of the 18th EPIA Conference on Artificial Intelligence, EPIA 2017, held in Porto, Portugal, in September 2017.