Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE '98) : Proceedings

Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE '98) : Proceedings
Author: IEEE Computer Society
Publisher: Institute of Electrical & Electronics Engineers(IEEE)
Total Pages: 408
Release: 1998
Genre: Computer conferencing
ISBN:

This volume comprises papers arising from the 7th Enabling Technologies workshop - WET-ICE '98. Topics include: access to information; collaboration; mobile agents;coordination; mobile computing; and intelligent agents and multi-agent systems.

Advanced Parallel and Distributed Computing

Advanced Parallel and Distributed Computing
Author: Yuan-Shun Dai
Publisher: Nova Publishers
Total Pages: 336
Release: 2007
Genre: Computers
ISBN: 9781600212024

The field of parallel and distributed computing is undergoing changes at a breathtaking pace. Networked computers are now omnipresent in virtually every application, from games to sophisticated space missions. The increasing complexity, heterogeneity, largeness, and dynamism of the emerging pervasive environments and associated applications are challenging the advancement of the parallel and distributed computing paradigm. Many novel infrastructures have been or are being created to provide the necessary computational fabric for realising parallel and distributed applications from diverse domains. New models and tools are also being proposed to evaluate and predict the quality of these complicated parallel and distributed systems. Current and recent past efforts, made to provide the infrastructures and models for such applications, have addressed many underlying complex problems and have thus resulted in new tools and paradigms for effectively realising parallel and distributed systems. This book showcases these novel tools and approaches with inputs from relevant experts.

Enabling Technologies for Wireless E-Business

Enabling Technologies for Wireless E-Business
Author: Weidon Kou
Publisher: Springer Science & Business Media
Total Pages: 396
Release: 2006-12-15
Genre: Computers
ISBN: 3540306374

Advances in wireless technologies promise to revolutionize the way we conduct business. This book provides complete coverage of the enabling technologies needed to make wireless e-business effective. These include wireless security, mobile payment, location-based services, mobile data management, and RFID technologies. The authors are highly distinguished. Dr. Weidong Kou is a Chief Architect and a Senior Manager of IBM Greater China Group, and a Laureate of 2004 Friendship Award of China. Dr. Yelena Yesha is an Exceptional Research Professor in the Department of Computer Science and Electrical Engineering at the University of Maryland. This book is an ideal introduction for both self-study and taught e-business classes or commercial training.

First IEEE International Conference on Cognitive Informatics

First IEEE International Conference on Cognitive Informatics
Author: Yingxu Wang
Publisher: I E E E
Total Pages: 386
Release: 2002
Genre: Computers
ISBN:

Cognitive informatics is a cutting-edge and profound interdisciplinary research area that tackles the common root problems of modern informatics, computation, software engineering, AI, cognitive science, and life sciences. ICCI '02 focuses on the natural information processing mechanisms and cognitive processes of the brain.

Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government

Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 1924
Release: 2020-09-30
Genre: Computers
ISBN: 1799853527

Even though blockchain technology was originally created as a ledger system for bitcoin to operate on, using it for areas other than cryptocurrency has become increasingly popular as of late. The transparency and security provided by blockchain technology is challenging innovation in a variety of businesses and is being applied in fields that include accounting and finance, supply chain management, and education. With the ability to perform such tasks as tracking fraud and securing the distribution of medical records, this technology is key to the advancement of many industries. The Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government is a vital reference source that examines the latest scholarly material on trends, techniques, and uses of blockchain technology applications in a variety of industries, and how this technology can further transparency and security. Highlighting a range of topics such as cryptography, smart contracts, and decentralized blockchain, this multi-volume book is ideally designed for academics, researchers, industry leaders, managers, healthcare professionals, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.

Intelligent Information Technologies: Concepts, Methodologies, Tools, and Applications

Intelligent Information Technologies: Concepts, Methodologies, Tools, and Applications
Author: Sugumaran, Vijayan
Publisher: IGI Global
Total Pages: 2614
Release: 2007-11-30
Genre: Computers
ISBN: 1599049422

This set compiles more than 240 chapters from the world's leading experts to provide a foundational body of research to drive further evolution and innovation of these next-generation technologies and their applications, of which scientific, technological, and commercial communities have only begun to scratch the surface.

Trust and Security in Collaborative Computing

Trust and Security in Collaborative Computing
Author: Xukai Zou
Publisher: World Scientific
Total Pages: 248
Release: 2008
Genre: Computers
ISBN: 9812703683

Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing ? one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing.This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing. The important modules treated include secure group communication, access control, dependability, grid computing, key management, intrusion detection, and trace back. In addition, a real project for developing a nationwide medical information system with high dependability and security is described.

Trust, Privacy and Security in Digital Business

Trust, Privacy and Security in Digital Business
Author: Stefanos Gritzalis
Publisher: Springer
Total Pages: 183
Release: 2019-08-19
Genre: Computers
ISBN: 3030278131

This book constitutes the refereed proceedings of the 16th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2019, held in Linz, Austria, in August 2019 in conjunction with DEXA 2019. The 11 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: privacy; and audit, compliance and threat intelligence. The chapter "A data utility-driven benchmark for de-identification methods" is open access under a CC BY 4.0 license at link.springer.com.

Theory and Practice of Cryptography Solutions for Secure Information Systems

Theory and Practice of Cryptography Solutions for Secure Information Systems
Author: Elçi, Atilla
Publisher: IGI Global
Total Pages: 611
Release: 2013-05-31
Genre: Computers
ISBN: 1466640316

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.