Télécharger le livre :  Location Privacy Preservation in Cognitive Radio Networks
This brief focuses on the current research on location privacy preservation in cognitive radio networks (CRNs). Along with a review of the existing works, this book includes fundamental privacy models, possible frameworks, useful performance, and future research...

Editeur : Springer
Parution : 2014-01-18
Collection : SpringerBriefs in Computer Science ePub

52,24

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information-Theoretic Evaluation for Computational Biomedical Ontologies
The development of effective methods for the prediction of ontological annotations is an important goal in computational biology, yet evaluating their performance is difficult due to problems caused by the structure of biomedical ontologies and incomplete annotations of...

Editeur : Springer
Parution : 2014-01-09
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  JRuby Rails Web Application Development
This SpringerBrief explains how to create a Rails web application with JRuby, a 100% Java implementation for Ruby.This brief demonstrates how Oracle® WebLogic servers and JBoss® application servers deploy the JRuby application, how JRuby runs on the Java® Virtual...

Editeur : Springer
Parution : 2014-01-06
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Collaborative Web Hosting
This brief presents a peer-to-peer (P2P) web-hosting infrastructure (named pWeb) that can transform networked, home-entertainment devices into lightweight collaborating Web servers for persistently storing and serving multimedia and web content. The issues addressed...

Editeur : Springer
Parution : 2014-01-04
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Data-driven Generation of Policies
This Springer Brief presents a basic algorithm that provides a correct solution to finding an optimal state change attempt, as well as an enhanced algorithm that is built on top of the well-known trie data structure. It explores correctness and algorithmic complexity...

Editeur : Springer
Parution : 2014-01-04
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Countering Brandjacking in the Digital Age
The rise of the Internet and social media in particular offer great opportunities for brand owners to increase business and brand recognition. While this has clearly been of benefit to brand owners, who have seen a consequent rise in the value of their brands, it...

Editeur : Springer
Parution : 2013-11-26
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Twitter Data Analytics
This brief provides methods for harnessing Twitter data to discover solutions to complex inquiries. The brief introduces the process of collecting data through Twitter’s APIs and offers strategies for curating large datasets. The text gives examples of Twitter data with...

Editeur : Springer
Parution : 2013-11-11
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Distributed Denial of Service Attack and Defense
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also...

Editeur : Springer
Parution : 2013-11-04
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Assessment in Vehicular Networks
This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which...

Editeur : Springer
Parution : 2013-10-29
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Bluetooth Security Attacks
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview ofBluetooth security. They examine network vulnerabilities...

Editeur : Springer
Parution : 2013-10-28
Collection : SpringerBriefs in Computer Science ePub

63,29

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Concise Computer Mathematics
Adapted from a modular undergraduate course on computational mathematics, Concise Computer Mathematics delivers an easily accessible, self-contained introduction to the basic notions of mathematics necessary for a computer science degree. The text reflects the need to...

Editeur : Springer
Parution : 2013-10-28
Collection : SpringerBriefs in Computer Science ePub

68,56

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Sentiment Analysis for PTSD Signals
This book describes a computational framework for real-time detection of psychological signals related to Post-Traumatic Stress Disorder (PTSD) in online text-based posts, including blogs and web forums. Further, it explores how emerging computational techniques such as...

Editeur : Springer
Parution : 2013-10-25
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Unsupervised Information Extraction by Text Segmentation
A new unsupervised approach to the problem of Information Extraction by Text Segmentation (IETS) is proposed, implemented and evaluated herein. The authors’ approach relies on information available on pre-existing data to learn how to associate segments in the input...

Editeur : Springer
Parution : 2013-10-23
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Location Privacy Protection in Mobile Networks
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile...

Editeur : Springer
Parution : 2013-10-17
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Resource Management in Utility and Cloud Computing
This SpringerBrief reviews the existing market-oriented strategies for economically managing resource allocation in distributed systems. It describes three new schemes that address cost-efficiency, user incentives, and allocation fairness with regard to different...

Editeur : Springer
Parution : 2013-10-17
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Spatio-Temporal Databases
This brief presents several new query processing techniques, called complex motion pattern queries, specifically designed for very large spatio-temporal databases of moving objects. The brief begins with the definition of flexible pattern queries, which are powerful...

Editeur : Springer
Parution : 2013-10-15
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security and Privacy in Mobile Social Networks
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two...

Editeur : Springer
Parution : 2013-10-12
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Distributed Hash Table
This SpringerBrief summarizes the development of Distributed Hash Table in both academic and industrial fields. It covers the main theory, platforms and applications of this key part in distributed systems and applications, especially in large-scale distributed...

Editeur : Springer
Parution : 2013-10-08
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Sustainable Wireless Networks
This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for...

Editeur : Springer
Parution : 2013-10-07
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Security
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on...

Editeur : Springer
Parution : 2013-10-04
Collection : SpringerBriefs in Computer Science ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
<< < 7891011 >