The first edition of the Encyclopedia of Complexity and Systems Science (ECSS, 2009) presented a comprehensive overview of granular computing (GrC) broadly divided into several categories: Granular computing from rough set theory, Granular Computing in Database Theory, Granular Computing in Social Networks, Granular Computing and Fuzzy Set Theory, Grid/Cloud Computing, as well as general issues in granular computing.
Gegenstand dieses Lehrbuches sind die Grundlagen der Informations- und Codierungstheorie, wie sie in den Fächern Informatik, Nachrichtentechnik, Elektrotechnik und Informationstechnik an vielen Hochschulen und Universitäten unterrichtet werden.
The first edition of the Encyclopedia of Complexity and Systems Science (ECSS, 2009) presented a comprehensive overview of granular computing (GrC) broadly divided into several categories: Granular computing from rough set theory, Granular Computing in Database Theory, Granular Computing in Social Networks, Granular Computing and Fuzzy Set Theory, Grid/Cloud Computing, as well as general issues in granular computing.
Encyclopedia of Multimedia, Second Edition provides easy access to important concepts, issues and technology trends in the field of multimedia technologies, systems, techniques, and applications.
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the interconnected and often critical nature of these systems.
This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held in Windsor, Canada, during August 24-26, 2022.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2023), held at Vidyasagar University, Midnapore, India, during March 24-26, 2023.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2023), held at Vidyasagar University, Midnapore, India, during March 24-26, 2023.
Amazon Web Services (AWS) provides on-demand cloud computing platforms and application programming interfaces (APIs) to individuals, companies, and govern- ments, along with distributed computing processing capacity and software tools via AWS server farms.
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 - 18 December 2022.
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 - 18 December 2022.
This proceedings volume convenes selected, revised papers presented at the 52nd Southeastern International Conference on Combinatorics, Graph Theory and Computing (SEICCGTC 2021), virtually held at Florida Atlantic University in Boca Raton, USA, on March 8-12, 2021.
Das Lehrbuch gibt einen systematischen Einstieg in die Signaltheorie und behandelt sowohl die in der Ingenieur-Literatur üblichen Werkzeuge zur Signal- und Systembeschreibung als auch die grundlegenden mathematischen Konzepte zur Interpretation von Signalen als Elemente von Vektorräumen und zur Signal-Approximation.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Card Research and Advanced Applications, CARDIS 2013, held in Berlin, Germany, in November 2013.
This proceedings volume presents a selection of peer-reviewed contributions from the Second Non-Associative Algebras and Related Topics (NAART II) conference, which was held at the University of Coimbra, Portugal, from July 18-22, 2022.
Master the art of designing, developing, and operating secure infrastructures on Google CloudKey FeaturesPrepare for the certification exam with clear explanations, real-world examples, and self-assessment questionsReview Google Cloud security best practices for building a secure and compliant cloud environmentExplore advanced concepts like Security Command Center, BeyondCorp Zero Trust, and container securityBook DescriptionGoogle Cloud security offers powerful controls to assist organizations in establishing secure and compliant cloud environments.
This proceedings volume presents a selection of peer-reviewed contributions from the Second Non-Associative Algebras and Related Topics (NAART II) conference, which was held at the University of Coimbra, Portugal, from July 18-22, 2022.
This book constitutes revised selected papers from the workshops that were affiliated with the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.
This book constitutes revised selected papers from the 53rd International Simulation and Gaming Association Conference, ISAGA 2022, which took place in Boston, USA, during July 11-14, 2022.
This book constitutes revised selected papers from the workshops that were affiliated with the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.
This book constitutes revised selected papers from the 53rd International Simulation and Gaming Association Conference, ISAGA 2022, which took place in Boston, USA, during July 11-14, 2022.
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection.
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection.
Data Analytics using Machine Learning Techniques on Cloud Platforms examines how machine learning (ML) and cloud computing combine to drive data-driven decision-making across industries.