Sports Engineering and Computer Science contains papers presented at the 2014 International Conference on Sport Science and Computer Science (SSCS 2014), held September 16-17, 2014 in Singapore and at the 2014 International Conference on Biomechanics and Sports Engineering (BSE 2014), held October 24-25, 2014, in Riga, Latvia.
This proceedings volume contains selected papers presented at the 2014 International Conference on Informatics, Networking and Intelligent Computing, held in Shenzhen, China.
The International Conference on Electronics, Information Technology and Intellectualization (ICEITI2014) was dedicated to build a high-level international academic communication forum for international experts and scholars.
This volume contains the papers presented at the 2014 International Conference on Future Communication Technology and Engineering (FCTE2014), taking place in Shenzhen, China from 16-17 November 2014.
These proceedings of the symposium ISIT 2014 aim to be a platform for international exchange of the state-of-the-art research and practice in information technology.
This proceedings volume contains selected papers presented at the 2014 International Conference on Frontiers in Computer Education (ICFCE 2014), which was held December 24-25, 2014, in Wuhan, China.
The conference on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresss between scholars, scientists and engineers all over the world and providing a unique opportunity to exchange information, to present the latest results as well as to review the relevant issues on
This book details how to assess electric mobility characteristics within electric vehicles, discussing energy management methods, automated systems, and the enormous potential of data resources mined from software, navigation systems, and connectivity.
Along with the increasingly important runtime engines pervasive in our daily-life computing, there is a strong demand from the software community for a solid presentation on the design and implementation of modern virtual machines, including the Java virtual machine, JavaScript engine and Android execution engine.
Along with the increasingly important runtime engines pervasive in our daily-life computing, there is a strong demand from the software community for a solid presentation on the design and implementation of modern virtual machines, including the Java virtual machine, JavaScript engine and Android execution engine.
Whether you are a CEO, CFO, board member, or an IT executive, From Business Strategy to Information Technology Roadmap: A Practical Guide for Executives and Board Members lays out a practical, how-to approach to identifying business strategies and creating value-driven technology roadmaps in your organization.
Cable and Wireless Networks: Theory and Practice presents a comprehensive approach to networking, cable and wireless communications, and networking security.
Whether you are a CEO, CFO, board member, or an IT executive, From Business Strategy to Information Technology Roadmap: A Practical Guide for Executives and Board Members lays out a practical, how-to approach to identifying business strategies and creating value-driven technology roadmaps in your organization.
Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems.
This book uses tutorials and new material to describe the basic concepts of soft-computing which potentially can be used in real-life sensor network applications.
By 2020, if not before, mobile computing and wireless systems are expected to enter the fifth generation (5G), which promises evolutionary if not revolutionary services.
Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications.
Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security provides a broad overview of wireless network spectrum sharing in seven distinct sections: The first section examines the big picture and basic principles, explaining the concepts of spectrum sharing, hardware/software function requirements for efficient sharing, and future trends of sharing strategies.
Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing.
Software-Defined Data Infrastructures Essentials provides fundamental coverage of physical, cloud, converged, and virtual server storage I/O networking technologies, trends, tools, techniques, and tradecraft skills.
Software Engineering for Science provides an in-depth collection of peer-reviewed chapters that describe experiences with applying software engineering practices to the development of scientific software.
Created to help scientists and engineers write computer code, this practical book addresses the important tools and techniques that are necessary for scientific computing, but which are not yet commonplace in science and engineering curricula.
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry.
Computer Network Simulations Using NS2 provides a solid foundation of computer networking knowledge and skills, covering everything from simple operating system commands to the analysis of complex network performance metrics.
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected.
In recent years, a lot of work has been done in an effort to incorporate Swarm Intelligence (SI) techniques in building an adaptive routing protocol for Mobile Ad Hoc Networks (MANETs).
This book offers a rigorous analysis of the achievements in the field of traffic control in large networks, oriented on two main aspects: the self-similarity in traffic behaviour and the scale-free characteristic of a complex network.
Develop the critical people skills and exceptional technical abilities necessary to provide outstanding support with Beisse's A GUIDE TO COMPUTER USER SUPPORT FOR HELP DESK AND SUPPORT SPECIALISTS, 6E.
For courses in Computer Science and Programming Computer systems: A Programmer's Perspective explains the underlying elements common among all computer systems and how they affect general application performance.
VLSI Signal Processing Principles, Practices, and ApplicationsThis comprehensive resource shows how very-large-scale integration (VLSI) technology can be effectively deployed in real-world electronics to meet cost, power, function, and reliability requirements.