- Book
Authors : Jørgen Hole, Kjell (2016) - As information and communications technology (ICT) becomes increasingly important to modern societies, there is a growing need to understand how to design and operate very large ICT systems. The book first discusses rare events with a large negative impact and argues that it is, at best, very hard to predict all such events in complex adaptive ICT systems. The book contains few abbreviations and formal definitions, background knowledge is intro...
|
- Book
Authors : Ganchev, Ivan (2018) - This book was prepared to play the role of a publication and dissemination platform of the technical aspects of the Final Report of the COST Action IC1304 “Autonomous Control for a Reliable Internet of Services (ACROSS)”. The book chapters were collected through an open, but selective, three-stage submission/review process. The first chapter entitled “State of the Art and Research Challenges in the Area of Autonomous Control for a Reliable ...
|
- Book
Authors : Lahiri, Shuvendu K. (2020) - AI Verification NNV: The Neural Network Verification Tool, Verification of Deep Convolutional Neural Networks Using ImageStars. An Abstraction-Based Framework for Neural Network Verification. Blockchain and Security
The Move Prover, End-to-End Formal Verification of Ethereum 2.0 Deposit Smart Contract. Concurrency
Semantics, Specification, and Bounded Verification of Concurrent Libraries in Replicated Systems Refinement for Structured Concurrent Programs. Hardware Verification and Decis...
|
- Book
Authors : Sen, Jaydip (2020) - This book discusses some of the critical security challenges being faced by today’s computing world, as well as mechanisms to defend against them using classical and modern techniques of cryptography. The book is organized into two sections. Section 1 contains six chapters that focus on various aspects of network security. Section 2 consists of three chapters dealing with various mechanisms of cryptography. In Chapter 1, “Introductory Chapter: Machine...
|
- Book
Authors : Lu, Wei (2020) - This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social n...
|
- Ebooks (Sách điện tử)
Authors : Cheruvu, Sulni (2019) - The Internet of things presents unique challenges in implementing security and Intel has both CPU and isolated security engine capabilities to simplify it. According to a report issued at the Trillion Sensors Summit, held in October 2014 at Stanford University, the number of connected machines and devices will be about 1 trillion by the year 2022. The majority of the IoT community is attempting to connect the billions of devices together.&...
|
- Book
Authors : Marwedel, Peter (2021) - Ein Alleinstellungsmerkmal dieses Open-Access-Lehrbuchs ist die umfassende Einführung in das Grundlagenwissen über eingebettete Systeme mit Anwendungen in cyber-physischen Systemen und dem Internet der Dinge. Es beginnt mit einer Einführung in das Gebiet und eine Übersicht über Spezifikationsmodelle und -sprachen für eingebettete und cyber-physikalische Systeme. Es gibt einen kurzen Überblick über die für solche Systeme verwendeten Hardware-Geräte und stellt die Grundlagen der System...
|
- Book
Authors : Cochez, Michael (2021) - Extended Workshop Papers : Active Semantic Relations in Layered Enterprise Architecture Development, A Belief Update System Using an Event Model for Location of People in a Smart Home. A Natural Language Generation Technique for Automated Psychotherapy, Creative Composition Problem: A Knowledge Graph Logical-Based AI Construction and Optimization Solution, Set Visualisations with Euler and Hasse Diagrams, Usage Patterns Identification Using Graphs and Machine Learning. Invi...
|
- Book
Authors : Ismail, Yasser (2019) - Internet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data bewteen each other. Internet of Things (IoT) Importance and Its Applications. Section 2 Smart Home Applications...
|
- Book
Authors : Strous, Leon (2019) - WCC 2018 Plenary Contributions: Keynote, Special Sessions Responsible Data Science in a Dynamic World: The Four Essential Elements of Data Science. IFIPIoT 2018 Invited Papers: Keynote, Panel Discussion The Internet of Things is Hardly About Technology. IFIPIoT 2018 Refereed Papers The Outcomes of the Implementation of Internet of Things: A Public Value Perspective.
|
- Book
Authors : Glückler, Johannes (2017) - This book discusses a core question in many fields of the social sciences, namely how to create, share and adopt new knowledge. It creates an original space for conversation between two lines of research that have developed largely in parallel for a long time: social network theory and the geography of knowledge. This book considers that relational thinking has become increasingly important for scholars to capture societal outcomes by studying&...
|
- Book
Authors : Scargall, Steve (2020) - Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times--a huge leap forward in byte-addressable capacity compared with current DRAM offerings. This revolutionary new technology gives applications significant performance and capacity improvements over ...
|
- Book
Authors : Mitra, Pinaki (2018) - Introductory Chapter: Recent Advances in Cryptography and Network Security, Chapter 2: A New Approximation Method for Constant Weight Coding and Its Hardware Implementation. Chapter 3: Protocol for Multiple Black Hole Attack Avoidance in Mobile Ad Hoc Networks. Chapter 4: A Survey of Machine Learning Techniques for
Behavioral-Based Biometric User Authentication.
|
- Book
Authors : Ulidowski, Irek (2020) - This open access State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing on those that have emerged during COST Action IC1405 "Reversible Computation - Extending Horizons of Computing", a European research network that operated from May 2015 to April 2019. Reversible computation is a new paradigm that extends the traditional forwards-only mode of computation with the ability to execute in ...
|
- Book
Authors : Avoine, Gildas (2021) - The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in secur...
|
- Book
Authors : Furber, Steve (2020) - This book is the story of the first 20 years of this research programme, an outcome of which is the world’s largest neuromorphic computing platform ultimately incorporating a million processor cores, capable of modelling spiking neural networks of the scale of a mouse brain in biological real time. The mouse brain is around a thousand times smaller than, but in some senses otherwise very similar to, the human brain. So there is s...
|
- Book
Authors : Lynn, Theo (2020) - Chapter 1 defines the Internet of Things and introduces key concepts and enabling technologies. It provides a sense-making framework that marries technical and socio-technical perspectives and summarises some of
the main Cloud-IoT reference architectures. Chapter 2 revisits conventional cloud computing and discusses how cloud computing is evolving as a result of the Internet of Things. It discusses how new processor architectures and service models are chang...
|
- Book
Authors : Mellamphy, Dan; Nandita Biswas Mellamphy (2016) - Nietzsche and Networks, Nietzschean Networks: The Digital Dionysus. Nietzsche and Networks, Nietzschean Networks: The Digital Dionysus. The Internet as a Development from Descartes’ Res Cogitans: How to Render It Dionysian Networked Nightmares: On Our Dionysian Post-Military Condition. A Philosophy of the Antichrist in the Time of the Anthropocenic Multitude: Preliminary Lexicon for the Conceptual Network. Occupying God’s Shadow: Nietzsche’s Eirōneia. Reading Nietzsche in t...
|
- Thesis
Authors : Nguyễn Viết Tuấn; Advisor : Vũ Thành Nam (2014) - Giới thiệu nguyên nhân, cấu trúc, quy trình hoạt động của IPv6. Công nghệ chuyển đổi IPv6-Ipv4. Đề xuất hướng triển khai IPv6 trong hệ thống video conferencing của tỉnh Hà Tĩnh.
|
- Book
Authors : Khatib, Mutamed (2020) - A wireless mesh network (WMN) is a wireless network with a large number of stationary wireless mesh routers that are connected using wireless communication techniques to form a mesh structure. Some of these routers act as a client wireless access point (such as laptops, PCs, and smart devices) with wireless connection
where these routers attach themselves to the mesh network in order to transmit and receive data via the backbone mesh...
|