Title search results
Showing 38161 - 38180 of 45896 items
Safety Message Broadcast in Vehicular Networks
By Weihua Zhuang, Haibo Zhou, Yuanguo Bi, Hai Zhao. 2017
This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection…
for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle-to-infrastructure communications. This book offers useful insights into protocol design and inspires a new line of thinking in performance improvements for safety applications in vehicular networks. It is a valuable resource for professionals, researchers, or advanced-level students working in vehicular networks or quality of service.Image Processing and Communications Challenges 8
By Ryszard S. Choraś. 2017
This book collects a series of research papers in the area of Image Processing and Communications which not only introduce…
a summary of current technology but also give an outlook of potential feature problems in this area. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in image processing and communications. The book is divided into two parts and presents the proceedings of the 8th International Image Processing and Communications Conference (IP&C 2016) held in Bydgoszcz, Poland September 7-9 2016. Part I deals with image processing. A comprehensive survey of different methods of image processing, computer vision is also presented. Part II deals with the telecommunications networks and computer networks. Applications in these areas are considered.Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications
By Tiziana Margaria, Bernhard Steffen. 2016
The two-volume set LNCS 9952 and LNCS 9953 constitutes the refereed proceedings of the 7th International Symposium on Leveraging Applications…
of Formal Methods, Verification and Validation, ISoLA 2016, held in Imperial, Corfu, Greece, in October 2016. The papers presented in this volume were carefully reviewed and selected for inclusion in the proceedings. Featuring a track introduction to each section, the papers are organized in topical sections named: statistical model checking; evaluation and reproducibility of program analysis and verification; ModSyn-PP: modular synthesis of programs and processes; semantic heterogeneity in the formal development of complex systems; static and runtime verification: competitors or friends?; rigorous engineering of collective adaptive systems; correctness-by-construction and post-hoc verification: friends or foes?; privacy and security issues in information systems; towards a unified view of modeling and programming; formal methods and safety certification: challenges in the railways domain; RVE: runtime verification and enforcement, the (industrial) application perspective; variability modeling for scalable software evolution; detecting and understanding software doping; learning systems: machine-learning in software products and learning-based analysis of software systems; testing the internet of things; doctoral symposium; industrial track; RERS challen≥ and STRESS.Machine Learning in Medical Imaging
By Qian Wang, Li Wang, Ehsan Adeli, Yinghuan Shi, Heung-Il Suk. 2016
This book constitutes the refereed proceedings of the 7th International Workshop on Machine Learning in Medical Imaging, MLMI 2016, held…
in conjunction with MICCAI 2016, in Athens, Greece, in October 2016. The 38 full papers presented in this volume were carefully reviewed and selected from 60 submissions. The main aim of this workshop is to help advance scientific research within the broad field of machine learning in medical imaging. The workshop focuses on major trends and challenges in this area, and presents works aimed to identify new cutting-edge techniques and their use in medical imaging.FM 2016: Formal Methods
By Stefania Gnesi, John Fitzgerald, Constance Heitmeyer, Anna Philippou. 2016
This book constitutes the refereed proceedings of the 21st International Symposium on Formal Methods, FM 2016, held in Limassol, Cyprus,…
in November 2016. The 38 full papers and 11 short papers presented together with one abstract of an invited talk and one invited presentation were carefully reviewed and selected from 162 submissions. The broad topics of interest for FM include: interdisciplinary formal methods; formal methods in practice; tools for formal methods; role of formal methods in software and systems engineering; theoretical foundations.Social Informatics
By Emma Spiro, Yong-Yeol Ahn. 2016
The two-volume set LNCS 10046 and 10047 constitutes the proceedings of the 8th International Conference on Social Informatics, SocInfo 2016,…
held in Bellevue, WA, USA, in November 2016. The 36 full papers and 39 poster papers presented in this volume were carefully reviewed and selected from 120 submissions. They are organized in topical sections named: networks, communities, and groups; politics, news, and events; markets, crowds, and consumers; and privacy, health, and well-being.Group Processes
By Marshall Scott Poole, Andrew Pilny. 2016
This volume introduces a series of different data-driven computational methods for analyzing group processes through didactic and tutorial-based examples. Group…
processes are of central importance to many sectors of society, including government, the military, health care, and corporations. Computational methods are better suited to handle (potentially huge) group process data than traditional methodologies because of their more flexible assumptions and capability to handle real-time trace data. Indeed, the use of methods under the name of computational social science have exploded over the years. However, attention has been focused on original research rather than pedagogy, leaving those interested in obtaining computational skills lacking a much needed resource. Although the methods here can be applied to wider areas of social science, they are specifically tailored to group process research. A number of data-driven methods adapted to group process research are demonstrated in this current volume. These include text mining, relational event modeling, social simulation, machine learning, social sequence analysis, and response surface analysis. In order to take advantage of these new opportunities, this book provides clear examples (e. g. , providing code) of group processes in various contexts, setting guidelines and best practices for future work to build upon. This volume will be of great benefit to those willing to learn computational methods. These include academics like graduate students and faculty, multidisciplinary professionals and researchers working on organization and management science, and consultants for various types of organizations and groups.Similarity Search and Applications
By Laurent Amsaleg, Michael E. Houle, Erich Schubert. 2016
This book constitutes the proceedings of the 9th International Conference on Similarity Search and Applications, SISAP 2016, held in Tokyo,…
Japan, in October 2016. The 18 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 47 submissions. The program of the conference was grouped in 8 categories as follows: graphs and networks; metric and permutation-based indexing; multimedia; text and document similarity; comparisons and benchmarks; hashing techniques; time-evolving data; and scalable similarity search.Map Framework
By Markus Schneider, Mark Mckenney. 2016
This book explores the concept of a map as a fundamental data type. It defines maps at three levels. The…
first is an abstract level, in which mathematic concepts are leveraged to precisely explain maps and operational semantics. The second is at a discrete level, in which graph theory is used to create a data model with the goal of implementation in computer systems. Finally, maps are examined at an implementation level, in which the authors discuss the implementation of a fundamental map data type in database systems. The map data type presented in this book creates new mechanisms for the storage, analysis, and computation of map data objects in any field that represents data in a map form. The authors develop a model that includes a map data type capable of representing thematic and geometric attributes in a single data object. The book provides a complete example of mathematically defining a data type, ensuring closure properties of those operations, and then translating that type into a state that is suited for implementation in a particular context. The book is designed for researchers and professionals working in geography or computer science in a range of fields including navigation, reasoning, robotics, geospatial analysis, data management, and information retrieval.The Semantic Web – ISWC 2016
By Paul Groth, Alasdair Gray, Elena Simperl, Marta Sabou, Markus Krötzsch, Freddy Lecue, Fabian Flöck, Yolanda Gil. 2016
The two-volume set LNCS 9981 and 9982 constitutes the refereed proceedings of the 15th International Semantic Web Conference, ISWC 2016, which…
was held in Kobe, Japan, in October 2016. The 75 full papers presented in these proceedings were carefully reviewed and selected from 326 submissions. The International Semantic Web Conference is the premier forum for Semantic Web research, where cutting edge scientific results and technological innovations are presented, where problems and solutions are discussed, and where the future of this vision is being developed. It brings together specialists in fields such as artificial intelligence, databases, social networks, distributed computing, Web engineering, information systems, human-computer interaction, natural language processing, and the social sciences. The Research Track solicited novel and significant research contributions addressing theoretical, analytical, empirical, and practical aspects of the Semantic Web. The Applications Track solicited submissions exploring the benefits and challenges of applying semantic technologies in concrete, practical applications, in contexts ranging from industry to government and science. The newly introduced Resources Track sought submissions providing a concise and clear description of a resource and its (expected) usage. Traditional resources include ontologies, vocabularies, datasets, benchmarks and replication studies, services and software. Besides more established types of resources, the track solicited submissions of new types of resources such as ontology design patterns, crowdsourcing task designs, workflows, methodologies, and protocols and measures.Graphical Models for Security
By Barbara Kordy, Mathias Ekstedt, Dong Seong Kim. 2016
This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015,…
held in Verona, Italy, in July 2015. The 5 revised full papers presented together with one short tool paper and one invited lecture were carefully reviewed and selected from 13 submissions. The workshop contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage, thus providing an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures.Hardware IP Security and Trust
By Swarup Bhunia, Prabhat Mishra, Mark Tehranipoor. 2017
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of…
IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.Web-Age Information Management
By Shaoxu Song, Yongxin Tong. 2016
This book constitutes the refereed proceedings of 3 workshops of the 17th International Conference on Web-Age Information Management, WAIM 2016,…
held in Nanchang, China, in June 2016. The three workshops were as follows: * The International Workshop on Spatiotemporal Data Management and Mining for the Web (SDMMW 2016) * The International Workshop on Semi-structured Big Data Management and Applications (SemiBDMA 2016). * The International Workshop on Mobile Web Data Analytics (MWDA2016)Informatics in Schools: Improvement of Informatics Knowledge and Perception
By Andrej Brodnik, Françoise Tort. 2016
This book constitutes the refereed proceedings of the 9th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP…
2016, held in M#65533;nster, Germany, in October 2015. The 17 full papers presented together with 1 invited talk were carefully reviewed and selected from 50 submissions. The focus of the conference was on following topics: sustainable education in informatics for pupils of all ages; connecting informatics lessons to the students' everyday lives; teacher education in informatics or computer science; and research on informatics or computer science in schools (empirical/qualitative/quantitative/theory building/research methods/comparative studies/transferability of methods and results from other disciplines).Formal Verification of Simulink/Stateflow Diagrams
By Naijun Zhan, Shuling Wang, Hengjun Zhao. 2017
This book presents a state-of-the-art technique for formal verification of continuous-time Simulink/Stateflow diagrams, featuring an expressive hybrid system modelling language,…
a powerful specification logic and deduction-based verification approach, and some impressive, realistic case studies. Readers will learn the HCSP/HHL-based deductive method and the use of corresponding tools for formal verification of Simulink/Stateflow diagrams. They will also gain some basic ideas about fundamental elements of formal methods such as formal syntax and semantics, and especially the common techniques applied in formal modelling and verification of hybrid systems. By investigating the successful case studies, readers will realize how to apply the pure theory and techniques to real applications, and hopefully will be inspired to start to use the proposed approach, or even develop their own formal methods in their future work.Shared Services and Outsourcing: A Contemporary Outlook
By Julia Kotlarsky, Ilan Oshri, Leslie P. Willcocks. 2016
This book constitutes the revised selected papers from the 10th Global Sourcing Workshop held in Val d'Is#65533;re, France, in February…
2016. The 11 papers presented in this volume were carefully reviewed and selected from 47 submissions. The book offers a review of the key topics in outsourcing and offshoring of information technology and business services offering practical frameworks that serve as a tool kit to students and managers. The range of topics covered is wide and diverse, but predominately focused on how to achieve success in shared services and outsourcing. More specifically, the book examines outsourcing decisions and management practices, giving specific attention to shared services that have become one of the dominant sourcing models. The topics discussed combine theoretical and practical insights regarding challenges that industry leaders, policy makers, and professionals face or should be concerned with. Case studies from various organizations, industries and countries such as UK, Italy, The Netherlands, Canada, Australia and Denmark complete the book.Information Security Practice and Experience
By Liqun Chen, Robert H. Deng, Guojun Wang, Feng Bao. 2008
This book constitutes the refereed proceedings of the 4th International Information Security Practice and Experience Conference, ISPEC 2008, held in…
Sydney, Australia, in May 2008. The papers cover a wide range of topics.Internet of Things. IoT Infrastructures
By Sherali Zeadally, Hakima Chaouchi, Mohamad Badra, Radu-Laurentiu Vieriu, Benny Mandler, Dagmar Cagáňová, Johann Marquez-Barja, Miguel Elias Mitre Campista, Stefano Giordano, Maria Fazio, Andrey Somov. 2016
The two-volume set LNICST 169 and 170 constitutes the thoroughly refereed post-conference proceedings of the Second International Internet of Things…
Summit, IoT 360#65533; 2015, held in Rome, Italy, in October 2015. The IoT 360#65533; is an event bringing a 360 degree perspective on IoT-related projects in important sectors such as mobility, security, healthcare and urban spaces. The conference also aims to coach involved people on the whole path between research to innovation and the way through to commercialization in the IoT domain. This volume contains 62 revised full papers at the following four conferences: The International Conference on Safety and Security in Internet of Things, SaSeIoT, the International Conference on Smart Objects and Technologies for Social Good, GOODTECHS, the International Conference on Cloud, Networking for IoT systems, CN4IoT, and the International Conference on IoT Technologies for HealthCare, HealthyIoT.Theoretical Aspects of Computing – ICTAC 2016
By Augusto Sampaio, Farn Wang. 2016
This book constitutes the refereed proceedings of the 13th International Colloquium on Theoretical Aspects of Computing, ICTAC 2016, held in…
Taipei, Taiwan, in October 2016. The 23 revised full papers presented together with two short papers, two invited papers and one abstract of an invited paper were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on program verification; design, synthesis and testing; calculi; specifications; composition and transformation; automata; temporal logics; tool and short papers.Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part III
By Jerzy Świątek, Leszek Borzemski, Adam Grzech, Zofia Wilimowska. 2017
This four volume set of books constitutes the proceedings of the 2016 37th International Conference Information Systems Architecture and Technology…
(ISAT), or ISAT 2016 for short, held on September 18-20, 2016 in Karpacz, Poland. The conference was organized by the Department of Management Systems and the Department of Computer Science, Wrocław University of Science and Technology, Poland. The papers included in the proceedings have been subject to a thorough review process by highly qualified peer reviewers. The accepted papers have been grouped into four parts: Part I--addressing topics including, but not limited to, systems analysis and modeling, methods for managing complex planning environment and insights from Big Data research projects. Part II--discoursing about topics including, but not limited to, Web systems, computer networks, distributed computing, and mulit-agent systems and Internet of Things. Part III--discussing topics including, but not limited to, mobile and Service Oriented Architecture systems, high performance computing, cloud computing, knowledge discovery, data mining and knowledge based management. Part IV--dealing with topics including, but not limited to, finance, logistics and market problems, and artificial intelligence methods.