Advances in Computer Science - ASIAN 2007. Computer and Network Security

Advances in Computer Science - ASIAN 2007. Computer and Network Security
Author: Iliano Cervesato
Publisher: Springer
Total Pages: 323
Release: 2007-11-17
Genre: Computers
ISBN: 3540769293

This book constitutes the refereed proceedings of the 12th Asian Computing Science Conference, ASIAN 2007, held in Doha, Qatar, in December 2007. Covering all current aspects of computer and network security, the papers are organized in topical sections on program security, computer security, access control, protocols, intrusion detection, network security, and safe execution.

ECAI 2023

ECAI 2023
Author: K. Gal
Publisher: IOS Press
Total Pages: 3328
Release: 2023-10-18
Genre: Computers
ISBN: 164368437X

Artificial intelligence, or AI, now affects the day-to-day life of almost everyone on the planet, and continues to be a perennial hot topic in the news. This book presents the proceedings of ECAI 2023, the 26th European Conference on Artificial Intelligence, and of PAIS 2023, the 12th Conference on Prestigious Applications of Intelligent Systems, held from 30 September to 4 October 2023 and on 3 October 2023 respectively in Kraków, Poland. Since 1974, ECAI has been the premier venue for presenting AI research in Europe, and this annual conference has become the place for researchers and practitioners of AI to discuss the latest trends and challenges in all subfields of AI, and to demonstrate innovative applications and uses of advanced AI technology. ECAI 2023 received 1896 submissions – a record number – of which 1691 were retained for review, ultimately resulting in an acceptance rate of 23%. The 390 papers included here, cover topics including machine learning, natural language processing, multi agent systems, and vision and knowledge representation and reasoning. PAIS 2023 received 17 submissions, of which 10 were accepted after a rigorous review process. Those 10 papers cover topics ranging from fostering better working environments, behavior modeling and citizen science to large language models and neuro-symbolic applications, and are also included here. Presenting a comprehensive overview of current research and developments in AI, the book will be of interest to all those working in the field.

IPTV Delivery Networks

IPTV Delivery Networks
Author: Suliman Mohamed Fati
Publisher: John Wiley & Sons
Total Pages: 286
Release: 2018-04-06
Genre: Technology & Engineering
ISBN: 1119397901

A guide to the current technologies related to the delivery process for both live and on-demand services within IPTV delivery networks IPTV Delivery Networks is an important resource thatoffers an in-depth discussion to the IPTV (Internet Protocol Television) delivery networks for both live and on demand IPTV services.This important book also includes a review of the issues and challenges surrounding the delivery of IPTV over various emerging networking and communications technologies. The authors — an international team of experts — introduce a framework for delivery network applicable for live and video-on-demand services. They review the fundamental issues of IPTV delivery networks and explore the QoS (Quality of Service) issue for IPTV delivery networks that highlights the questions of security and anomaly detection as related to quality. IPTV Delivery Networks also contains a discussion of the mobility issues and next-generation delivery networks. This guide captures the latest available and usable technologies in the field and: Explores the technologies related to delivery process for both live (real time) and on demand services in highly accessible terms Includes information on the history, current state and future of IPTV delivery Reviews all the aspects of delivery networks including storage management, resource allocation, broadcasting, video compression, QoS and QoE Contains information on current applications including Netflix (video on demand), BBC iPlayer (time-shifted IPTV) and live (real time) streaming Written for both researchers and industrial experts in the field of IPTV delivery networks. IPTV Delivery Networks is a groundbreaking book that includes the most current information available on live and on demand IPTV services.

Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough

Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough
Author: Vinit Kumar Gunjan
Publisher: Springer Nature
Total Pages: 337
Release: 2024-01-13
Genre: Technology & Engineering
ISBN: 3031430093

This book provides a systematic and comprehensive overview of cognitive intelligence and AI-enabled IoT ecosystem and machine learning, capable of recognizing the object pattern in complex and large data sets. A remarkable success has been experienced in the last decade by emulating the brain–computer interface. It presents the applied cognitive science methods and AI-enabled technologies that have played a vital role at the core of practical solutions for a wide scope of tasks between handheld apps and industrial process control, autonomous vehicles, IoT, intelligent learning environment, game theory, human computer interaction, environmental policies, life sciences, playing computer games, computational theory, and engineering development. The book contains contents highlighting artificial neural networks that are analogous to the networks of neurons that comprise the brain and have given computers the ability to distinguish an image of a cat from one of a coconut, to spot pedestrians with enough accuracy to direct a self-driving car, and to recognize and respond to the spoken word. The chapters in this book focus on audiences interested in artificial intelligence, machine learning, fuzzy, cognitive and neurofuzzy-inspired computational systems, their theories, mechanisms, and architecture, which underline human and animal behavior, and their application to conscious and intelligent systems. In the current version, it focuses on the successful implementation and step-by-step execution and explanation of practical applications of the domain. It also offers a wide range of inspiring and interesting cutting-edge contributions on applications of machine learning, artificial intelligence, and cognitive science such as healthcare products, AI-enabled IoT, gaming, medical, and engineering. Overall, this book provides valuable information on effective, cutting-edge techniques, and approaches for students, researchers, practitioners, and academics in the field of machine learning and cognitive science. Furthermore, the purpose of this book is to address the interests of a broad spectrum of practitioners, students, and researchers, who are interested in applying machine learning and cognitive science methods in their respective domains.

Proceedings of the 5th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2014)

Proceedings of the 5th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2014)
Author: Ershi Qi
Publisher: Springer
Total Pages: 419
Release: 2015-01-19
Genre: Business & Economics
ISBN: 9462391009

The 5th International Asia Conference on Industrial Engineering and Management Innovation is sponsored by the Chinese Industrial Engineering Institution and organized by Xi’an Jiaotong University. The conference aims to share and disseminate information on the most recent and relevant researches, theories and practices in industrial and system engineering to promote their development and application in university and enterprises.

Advances in Information and Computer Security

Advances in Information and Computer Security
Author: Kanta Matsuura
Publisher: Springer
Total Pages: 309
Release: 2008-11-23
Genre: Computers
ISBN: 3540895981

This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008. The 18 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on cryptography, signature and signcryption, software security, privacy protection and contents protection, authentication and access control, as well as implementation.

Hacker States

Hacker States
Author: Luca Follis
Publisher: MIT Press
Total Pages: 263
Release: 2020-04-07
Genre: Computers
ISBN: 0262043602

How hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power. In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the expression and deployment of state power. Follis and Fish trace government efforts to control the power of the internet; the prosecution of hackers and leakers (including such well-known cases as Chelsea Manning, Edward Snowden, and Anonymous); and the eventual rehabilitation of hackers who undertake “ethical hacking” for the state. Analyzing the evolution of the state's relationship to hacking, they argue that state-sponsored hacking ultimately corrodes the rule of law and offers unchecked advantage to those in power, clearing the way for more authoritarian rule. Follis and Fish draw on a range of methodologies and disciplines, including ethnographic and digital archive methods from fields as diverse as anthropology, STS, and criminology. They propose a novel “boundary work” theoretical framework to articulate the relational approach to understanding state and hacker interactions advanced by the book. In the context of Russian bot armies, the rise of fake news, and algorithmic opacity, they describe the political impact of leaks and hacks, hacker partnerships with journalists in pursuit of transparency and accountability, the increasingly prominent use of extradition in hacking-related cases, and the privatization of hackers for hire.

Algebraic Methodology and Software Technology

Algebraic Methodology and Software Technology
Author: José Meseguer
Publisher: Springer Science & Business Media
Total Pages: 442
Release: 2008-07-15
Genre: Computers
ISBN: 3540799796

This book constitutes the refereed proceedings of the 12th International Conference on Algebraic Methodology and Software Technology, AMAST 2008, held in Urbana, IL, USA, in July 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 58 submissions. Among the topics covered are all current issues in formal methods related to algebraic and logical foundations, software technology, and to programming methodology including concurrent and reactive systems, evolutionary software/adaptive systems, logic and functional programming, object paradigms, constraint programming and concurrency, program verification and transformation, programming calculi, specification languages and tools, formal specification and development case studies, logic, category theory, relation algebra, computational algebra, algebraic foundations for languages and systems, coinduction, theorem proving and logical frameworks for reasoning, logics of programs, as well as algebra and coalgebra.

Advanced Security and Privacy for RFID Technologies

Advanced Security and Privacy for RFID Technologies
Author: Ali Miri
Publisher: IGI Global
Total Pages: 237
Release: 2013-01-01
Genre: Computers
ISBN: 1466636866

"This book addresses security risks involved with RFID technologies, and gives insight on some possible solutions and preventions in dealing with these developing technologies"--

Information Security and Optimization

Information Security and Optimization
Author: Rohit Tanwar
Publisher: CRC Press
Total Pages: 240
Release: 2020-11-18
Genre: Computers
ISBN: 1000220559

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools—definitions, usage, and analysis—that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.