Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This volume constitutes selected papers presented at the First International Conference on Engineering Software for Modern Challenges, ESMoC 2021, held in Johor, Malaysia, in October 20-21, 2021.The 17 papers presented were thoroughly reviewed and selected from the 167 submissions. They are organized in the topical sections on software engineering; intelligent systems; software quality.
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates.The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and post-quantum cryptography.
Data privacy technologies are essential for implementing information systems with privacy by design.Privacy technologies clearly are needed for ensuring that data does not lead to disclosure, but also that statistics or even data-driven machine learning models do not lead to disclosure. For example, can a deep-learning model be attacked to discover that sensitive data has been used for its training? This accessible textbook presents privacy models, computational definitions of privacy, and methods to implement them. Additionally, the book explains and gives plentiful examples of how to implement-among other models-differential privacy, k-anonymity, and secure multiparty computation.Topics and features:Provides integrated presentation of data privacy (including tools from statistical disclosure control, privacy-preserving data mining, and privacy for communications)Discusses privacy requirements and tools for different types of scenarios, including privacy for data, for computations, and for usersOffers characterization of privacy models, comparing their differences, advantages, and disadvantagesDescribes some of the most relevant algorithms to implement privacy modelsIncludes examples of data protection mechanismsThis unique textbook/guide contains numerous examples and succinctly and comprehensively gathers the relevant information. As such, it will be eminently suitable for undergraduate and graduate students interested in data privacy, as well as professionals wanting a concise overview.Vicenc Torra is Professor with the Department of Computing Science at Umea University, Umea, Sweden.
Die Codierungstheorie, die sich mit Verfahren zur Erkennung und Korrektur von Fehlern bei Datenubertragungen und beim Auslesen von Speichermedien beschaftigt, ist heute aus Technik, Wirtschaft und aus unserem Alltag nicht mehr wegzudenken. Das Buch stellt anschaulich und leicht verstandlich die wichtigsten, auch in der Praxis verwendeten Methoden vor. Dazu gehoren Prufziffern und CRC-Verfahren zur Fehlererkennung. Eingegangen wird aber auch auf historisch und fur den heutigen Alltag wichtige Codes zur Fehlerkorrektur. Hierzu zahlen insbesondere die Hamming-, Reed-Muller-, Reed-Solomon-, Faltungs- und Turbo-Codes. Verfahren, die darauf basieren, sind unter anderem beim Digitalfernsehen, beim Internet, beim Mobilfunk, in der Satellitennavigation, in der Raumfahrt, bei CDs und DVDs und bei QR-Codes implementiert.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
This text covers fundamentals of Python up to object-oriented concepts including regular expression, and applications in a single volume. It will an ideal text for senior undergraduate, graduate students, and professionals in the fields of electrical engineering, electronics and communication engineering, and computer engineering.
Coding Care. Towards a Technology for Nature brings together contributions from renowned authors and artists who are particularly concerned with nature and our environment. In doing so, they raise the question of how we can use technology to better understand nature and shape coexistence in a sustainable way - especially in regions that are not yet fully technologized. In this sense, coding should be understood as a form of caring, a substitute for what technology can contribute to the future in each specific cultural and regional context.
This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi'an, China, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104 initial submissions. The papers focus on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.
This book constitutes the revised selected papers of the 10th International Conference on Networked Systems, NETYS 2022, held as virtual event, in May 17-19, 2022. The conference was held virtually due to the COVID-19 crisis.The 18 full papers and 2 short papers presented were carefully reviewed and selected from 100 submissions. The scope of the conference covers all aspects related to the design and the development of these systems, including multi-core architectures, Concurrent and distributed algorithms, parallel/concurrent/distributed programming, distributed databases, big data applications and systems, cloud systems, networks, security, and formal verification.They were organized in topical sections as follows: Distributed System; Networking; Verification; Security.
Der menschliche Verstand ist evolutionär darauf ausgelegt, Abkürzungen zu nehmen, um zu überleben. Wir ziehen voreilige Schlüsse, weil unser Gehirn uns in Sicherheit wiegen will. Die meisten unserer Voreingenommenheiten wirken sich zu unseren Gunsten aus, z. B. wenn wir ein Auto, das in unsere Richtung fährt, für gefährlich halten und sofort ausweichen oder wenn wir beschließen, einen Bissen Essen, der verdorben zu sein scheint, nicht zu essen. Allerdings wirken sich inhärente Vorurteile negativ auf das Arbeitsumfeld und die Entscheidungsfindung in unseren Gemeinschaften aus. Mit der Entwicklung von Algorithmen und maschinellem Lernen wird zwar versucht, Voreingenommenheit zu beseitigen, aber schließlich werden sie doch von Menschen geschaffen und sind daher anfällig für das, was wir als algorithmische Voreingenommenheit bezeichnen.In Understand, Manage, and Prevent Algorithmic Bias (Algorithmische Voreingenommenheit verstehen, verwalten und verhindern) hilft Ihnen der Autor Tobias Baer zu verstehen, woher algorithmische Voreingenommenheit kommt, wie man sie als Geschäftsanwender oder Regulierungsbehörde handhaben kann und wie die Datenwissenschaft verhindern kann, dass Voreingenommenheit in statistische Algorithmen einfließt. Baer befasst sich fachkundig mit einigen der mehr als 100 Arten natürlicher Verzerrungen wie Confirmation Bias, Stability Bias, Pattern Recognition Bias und vielen anderen. Algorithmische Voreingenommenheit spiegelt diese menschlichen Tendenzen wider und hat ihren Ursprung in ihnen.Während sich die meisten Schriften über algorithmische Voreingenommenheit auf die Gefahren konzentrieren, weist der Kern dieses positiven, unterhaltsamen Buches auf einen Weg hin, auf dem Voreingenommenheit in Schach gehalten und sogar beseitigt wird. Sie erhalten Managementtechniken, um unvoreingenommene Algorithmen zu entwickeln, die Fähigkeit, Voreingenommenheit schneller zu erkennen, und das Wissen, um unvoreingenommene Daten zu erstellen. Algorithmic Bias verstehen, verwalten und verhindern ist ein innovatives, zeitgemäßes und wichtiges Buch, das in Ihr Regal gehört. Ganz gleich, ob Sie eine erfahrene Führungskraft, ein Datenwissenschaftler oder einfach nur ein Enthusiast sind - jetzt ist ein entscheidender Zeitpunkt, um sich über die größeren soziologischen Auswirkungen von Verzerrungen im digitalen Zeitalter zu informieren.Dieses Buch stellt die Übersetzung einer englischsprachigen Originalausgabe dar. Die Übersetzung wurde mit Hilfe von künstlicher Intelligenz erstellt (maschinelle Übersetzung mit DeepL.com). Eine anschließende manuelle Überarbeitung erfolgte vor allem nach inhaltlichen Gesichtspunkten, so dass das Buch stilistisch von einer herkömmlichen Übersetzung abweichen kann.
The popularity of Android mobile phones has attracted cybercriminals to create malware applications that carry out various malicious activities. This book will be highly useful for Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against Android malware.
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. An appendix includes a review of probability theory. Illustrations and graphics will help the reader understand the theory.
This book constitutes the proceedings of the 26th International Conference on Theory and Practice of Digital Libraries, TPDL 2022, which took place in Padua, Italy, in September 2022. The 18 full papers, 27 short papers and 15 accelerating innovation papers included in these proceedings were carefully reviewed and selected from 107 submissions. They focus on digital libraries and associated technical, practical, and social issues.
This volume constitutes the proceedings of the 20th Asian Simulation Conference, AsiaSim 2021, held as a virtual event in November 2021.The 9 full papers presented in this volume were carefully reviewed and selected from 23 submissions. The papers are organized in topical sections on simulation and visualization; modeling and simulation of systems.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.