Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book constitutes the refereed proceedings of the 16th International Conference on Verification and Evaluation of Computer and Communication Systems, VECoS 2023, held in Marrakech, Morocco, during October 18¿20, 2023. The 12 full papers included in this book were carefully reviewed and selected from 36 submissions. The topics presented covered a range of subjects, including approaches to improving the scalability and efficiency of formal verification and their applications to blockchain, smart contracts and neural networks.
This book includes extended and revised versions of selected papers from the 11th and 12th editions of the International Conference on Operations Research and Enterprise Systems (ICORES 2022 and ICORES 2023). ICORES 2022 was held as a virtual event in February 2022, and ICORES 2023 was held in Lisbon, Portugal, in February 2023. The 5 full papers included in this book were carefully reviewed and selected from the 55 submissions for ICORES 2022, and 8 full papers were reviewed and selected from the 55 submissions for ICORES 2023. The papers are focused on operations research and enterprise systems.
This book constitutes the refereed proceedings of the 22nd IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2023, held in Curitiba, Brazil, during November 9¿11, 2023.The 29 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 68 submissions. The contributions were organized in topical sections as follows: Artificial Intelligence and Algorithm; Digital Transformation and New Technologies; and Sustainable Technologies and Smart Cities.
This book constitutes the refereed post-conference proceedings of the 7th International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2023, held in Bratislava, Slovakia, in October 2023. The 14 revised full papers were carefully reviewed and selected from 35 submissions. The papers are organized in thematic sessions on: future access networks; sustainable communications and computing infrastructures; smart environment applications / scenarios.
This book begins with a historical overview of the evolution of mobile technologies and addresses two key questions: why do we need 6G? and what will 6G be? The remaining chapters of this book are organized into three parts: Part I covers the foundation of an end-to-end 6G system by presenting 6G vision, driving forces, key performance indicators, and societal requirements on digital inclusion, sustainability, and intelligence. Part II presents key radio technology components for the 6G communications to deliver extreme performance, including new radio access technologies at high frequencies, joint communications and sensing, AI-driven air interface, among others. Part III describes key enablers for intelligent 6G networking, including network disaggregation, edge computing, data-driven management and orchestration, network security and trustworthiness, among others. This book is relevant to researchers, professionals, and academics working in 5G/6G and beyond.
This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16¿20, 2023. The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains.
This book presents and develops comprehensive knowledge of vehicular channel characteristics and proper vehicular channel models. The studied topics contain the propagation characteristics of vehicular communications, such as: a time-frequency non-stationary single-input single-output (SISO) vehicle-to-vehicle (V2V) non-geometry stochastic model (NGSM); a space-time non-stationary massive multiple-input multiple-output (MIMO) V2V regular-shaped geometry-based stochastic model (RS-GBSM); and a space-time non-stationary massive MIMO V2V irregular-shaped geometry-based stochastic model (IS-GBSM). Each is introduced, with characteristics then discussed in detail. Finally, this book discusses future research directions to inspire further investigation in the field of vehicular channels from three different perspectives.
This book constitutes the refereed proceedings of the 15th International Symposium on Search-Based Software Engineering, SSBSE 2023, which took place in San Francisco, CA, USA, during December 8, 2023.The 7 full and 7 short papers included in this book were carefully reviewed and selected from 23 submissions. They focus on formulating various optimization problems in software engineering as search problems, addressing them with search techniques, intending to automate complex software engineering tasks.
This book constitutes the refereed proceedings of the 26th Brazilian Symposium on Formal Methods, SBMF 2023, held in Manaus, Brazil, during December 4-8, 2023.The 7 full papers and 2 short papers presented in this book were carefully reviewed and selected from 16 submissions.The papers are divided into the following topical sections: specification and modeling languages; testing; and verification and validation.
This book constitutes the refereed proceedings of the 8th International Conference on Engineering of Computer-Based Systems, ECBS 2023, which was held in Västerås, Sweden, in October 2023. The 11 full papers included in this book were carefully reviewed and selected from 26 submissions and present software, hardware, and communication perspectives of systems engineering through its many facets. The special theme of this year is ¿Engineering for Responsible AI¿.
This book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2020. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.
This book constitutes the proceedings of the 17th Chinese Conference, CCBR 2023, held in Xuzhou, China, during December 1¿3, 2023.The 41 full papers included in this volume were carefully reviewed and selected from 79 submissions. The volume is divided in topical sections named: Fingerprint, Palmprint and Vein Recognition; Face Detection, Recognition and Tracking; Affective Computing and Human-Computer Interface; Trustworthy, Privacy and Personal Data Security; Medical and Other Applications.
This book constitutes the refereed proceedings of the 20th International Conference on Virtual Reality and Mixed Reality, EuroXR 2023, held in Rotterdam, the Netherlands, during November 29-December 1, 2023.The 14 full papers presented together with 2 short papers were carefully reviewed and selected from 42 submissions.The papers are grouped into the following topics: Interaction in Virtual Reality; Designing XR Experiences; and Human Factors in VR: Performance, Acceptance, and Design.
This book provides comprehensive insights into the theory, models, and unique characteristics of intelligent reflecting surface (IRS) and its appealing applications in wireless information and power transmission for B5G/6G. It is organized as follows:Chapter 1 gives an overview of the fundamentals of IRS, including the signal and channel models of IRS, its hardware architecture, advantages and practical constraints. Chapter 2, 3 and 4 focus on how to optimize the joint design of active and passive beamforming for three types of IRS-aided wireless information/energy transmission systems, namely IRS-aided power transfer (WPT), IRS-aided simultaneous wireless information and power transfer (SWIPT) and IRS-aided wireless powered communication networks (WPCN).Chapter 2 specifically presents a general framework design for IRS-aided WPT systems from the perspectives of energy beamforming design and channel estimation, while the dynamic IRS beamforming design is also discussed.Chapter 3 thoroughly studies the IRS-aided SWIPT for achieving better R-E trade-off, wherein two different designs based on weighted sum-power maximization at energy users (EUs) and under individual quality-of-service (QoS), requirements at both information users (IUs) and EUs are investigated. Chapter 4 presents three paradigms of IRS-aided WPCN, i.e., IRS-aided half-duplex (HD) WPCN, IRS-aided full-duplex (FD) WCPN and IRS-aided multiple-input-multiple-output (MIMO) FD WPCN. The authors present some related emerging topics, e.g., active IRS aided wireless communications and IRS-aided unmanned aerial vehicle (UAV) communications in chapter 5.This book targets postgraduate students studying electrical engineering and computer science, and can be used as a secondary textbook. Professionals, researchers and engineers working in wireless networks will also find this book useful as a reference.
This volume constitutes selected papers presented at the 10th International Conference on Innovation and New Trends in Information Technology, INTIS 2022, held in Casablanca, Morocco, in May 2022, and 11th International Conference on Innovation and New Trends in Information Technology, INTIS 2023, held in Tangier, Morocco, in May 2023.After the thorough peer review process, 4 papers were selected from the 27 submissions received for INTIS 2022, and 11 papers were selected from the 33 submissions received for INTIS 2023. The presented papers cover the mail topics of data-enabled systems/applications: data source layer, network layer, data layer, learning layer, and reporting layers while considering non-functional properties such as data privacy, security, and ethics.
This book constitutes the refereed proceedings of the 17th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2022, which was supposed to be held in Lima, Peru, in May 2021, but was held virtually instead due to the COVID-19 pandemic.The 40 revised full papers presented were carefully reviewed and selected from 58 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: digital platforms and gig economy; education and health; inclusion and participation; and business innovation and data privacy.
This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view.The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book.
Die zunehmende Datenflut und der Bedarf an zentralisierten, zugänglichen Speicherlösungen hat die Bedeutung von Netzwerkspeicherlösungen (NAS) in den Vordergrund gerückt. Das Herzstück des Buches bildet die umfassende Anleitung für die Implementierung eines NAS als Web- und Datenbankserver. Es behandelt eingehend die Integration und Verwaltung von NAS in Netzwerkumgebungen. Dabei werden essenzielle Themen wie IP-Konfigurationen, Routing und Switching sowie die Einrichtung von Nutzerkonten und Zugriffsrechten detailliert beleuchtet, um eine sichere und erweiterbare Netzwerkinfrastruktur zu schaffen.Der Bereich Sicherheit erhält eine besondere Betonung. Leserinnen und Leser erhalten Einblick in Firewall-Konfigurationen, den Umgang mit SSL-Zertifikaten, die Einrichtung von VPNs und Strategien zur Abwehr von DDoS-Angriffen. Zudem werden präventive Maßnahmen und Methoden zur Überwachung und Alarmierung, die die Integrität und Sicherheit des NAS gewährleisten, eingehend besprochen.Speicherstrategien sind ein weiterer zentraler Punkt des Buches, wo verschiedene RAID-Konfigurationen und -Level unter die Lupe genommen werden, um ein umfassendes Verständnis ihrer Vor- und Nachteile zu vermitteln. Ergänzt wird dieser Teil durch praxisnahe Erläuterungen zu Methoden der Speichereffizienz, einschließlich Thin Provisioning und Daten Deduplizierung.Das Buch wendet sich an IT-Professionals und technikaffine Heimanwender gleichermaßen, die das volle Potenzial eines NAS-Systems ausschöpfen möchten. Es dient als Wegweiser, um die technischen Möglichkeiten moderner Netzwerkspeicher voll auszunutzen und in anspruchsvollen Anwendungen effektiv zu nutzen.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.