Author: Jiangtao Wang
Publisher: Springer Nature
ISBN: 9813345322
Category : Computers
Languages : en
Pages : 91
Book Description
This book constitutes the refereed proceedings of the Workshops from the 15th International Conference on Green, Pervasive, and Cloud Computing, GPC 2020, held in Xi'an, China, in November 2020. Due to the COVID-19 pandemic this event was held virtually. The 5 full papers presented in this book together with 3 short papers were carefully reviewed and selected from 16 submissions. They present recent research in the areas of urban computing, intelligent transportation and social computing.
Green, Pervasive, and Cloud Computing – GPC 2020 Workshops
Author: Jiangtao Wang
Publisher: Springer Nature
ISBN: 9813345322
Category : Computers
Languages : en
Pages : 91
Book Description
This book constitutes the refereed proceedings of the Workshops from the 15th International Conference on Green, Pervasive, and Cloud Computing, GPC 2020, held in Xi'an, China, in November 2020. Due to the COVID-19 pandemic this event was held virtually. The 5 full papers presented in this book together with 3 short papers were carefully reviewed and selected from 16 submissions. They present recent research in the areas of urban computing, intelligent transportation and social computing.
Publisher: Springer Nature
ISBN: 9813345322
Category : Computers
Languages : en
Pages : 91
Book Description
This book constitutes the refereed proceedings of the Workshops from the 15th International Conference on Green, Pervasive, and Cloud Computing, GPC 2020, held in Xi'an, China, in November 2020. Due to the COVID-19 pandemic this event was held virtually. The 5 full papers presented in this book together with 3 short papers were carefully reviewed and selected from 16 submissions. They present recent research in the areas of urban computing, intelligent transportation and social computing.
Green, Pervasive, and Cloud Computing
Author: Zhiwen Yu
Publisher: Springer Nature
ISBN: 3030642437
Category : Computers
Languages : en
Pages : 519
Book Description
This book constitutes the refereed proceedings of the 15th International Conference on Green, Pervasive, and Cloud Computing, GPC 2020, held in Xi'an, China, in November 2020. The 30 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 96 submissions. They cover the following topics: Device-free Sensing; Machine Learning; Recommendation Systems; Urban Computing; Human Computer Interaction; Internet of Things and Edge Computing; Positioning; Applications of Computer Vision; CrowdSensing; and Cloud and Related Technologies.
Publisher: Springer Nature
ISBN: 3030642437
Category : Computers
Languages : en
Pages : 519
Book Description
This book constitutes the refereed proceedings of the 15th International Conference on Green, Pervasive, and Cloud Computing, GPC 2020, held in Xi'an, China, in November 2020. The 30 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 96 submissions. They cover the following topics: Device-free Sensing; Machine Learning; Recommendation Systems; Urban Computing; Human Computer Interaction; Internet of Things and Edge Computing; Positioning; Applications of Computer Vision; CrowdSensing; and Cloud and Related Technologies.
Green, Pervasive, and Cloud Computing
Author: Chen Yu
Publisher: Springer Nature
ISBN: 3031261186
Category : Computers
Languages : en
Pages : 269
Book Description
This book constitutes the refereed proceedings of the 17th International Conference on Green, Pervasive, and Cloud Computing, GPC 2022, held in Chengdu, China, in December 2022. The 19 full papers presented in this book were carefully reviewed and selected from 104 submissions. GPC 2022 shares novel ideas and experiences in the areas of Green, Pervasive, and Cloud Computing.
Publisher: Springer Nature
ISBN: 3031261186
Category : Computers
Languages : en
Pages : 269
Book Description
This book constitutes the refereed proceedings of the 17th International Conference on Green, Pervasive, and Cloud Computing, GPC 2022, held in Chengdu, China, in December 2022. The 19 full papers presented in this book were carefully reviewed and selected from 104 submissions. GPC 2022 shares novel ideas and experiences in the areas of Green, Pervasive, and Cloud Computing.
Green, Pervasive, and Cloud Computing
Author: Man Ho Allen Au
Publisher: Springer
ISBN: 3319571869
Category : Computers
Languages : en
Pages : 821
Book Description
This book constitutes the proceedings of the 12th International Conference on Green, Pervasive, and Cloud Computing, GPC 2017, held in Cetara, Italy, in May 2017 and the following colocated workshops: First International Workshop on Digital Knowledge Ecosystems 2017; and First Workshop on Cloud Security Modeling, Monitoring and Management, CS3M 2017. The 58 full papers included in this volume were carefully reviewed and selected from 169 initial submissions. They deal with cryptography, security and biometric techniques; advances network services, algorithms and optimization; mobile and pervasive computing; cybersecurity; parallel and distributed computing; ontologies and smart applications; and healthcare support systems.
Publisher: Springer
ISBN: 3319571869
Category : Computers
Languages : en
Pages : 821
Book Description
This book constitutes the proceedings of the 12th International Conference on Green, Pervasive, and Cloud Computing, GPC 2017, held in Cetara, Italy, in May 2017 and the following colocated workshops: First International Workshop on Digital Knowledge Ecosystems 2017; and First Workshop on Cloud Security Modeling, Monitoring and Management, CS3M 2017. The 58 full papers included in this volume were carefully reviewed and selected from 169 initial submissions. They deal with cryptography, security and biometric techniques; advances network services, algorithms and optimization; mobile and pervasive computing; cybersecurity; parallel and distributed computing; ontologies and smart applications; and healthcare support systems.
Green, Pervasive, and Cloud Computing
Author: Man-Ho Au
Publisher:
ISBN: 9783319571874
Category : Cloud computing
Languages : en
Pages : 815
Book Description
This book constitutes the proceedings of the 12th International Conference on Green, Pervasive, and Cloud Computing, GPC 2017, held in Cetara, Italy, in May 2017 and the following colocated workshops: First International Workshop on Digital Knowledge Ecosystems 2017; and First Workshop on Cloud Security Modeling, Monitoring and Management, CS3M 2017. The 58 full papers included in this volume were carefully reviewed and selected from 169 initial submissions. They deal with cryptography, security and biometric techniques; advances network services, algorithms and optimization; mobile and pervasive computing; cybersecurity; parallel and distributed computing; ontologies and smart applications; and healthcare support systems.
Publisher:
ISBN: 9783319571874
Category : Cloud computing
Languages : en
Pages : 815
Book Description
This book constitutes the proceedings of the 12th International Conference on Green, Pervasive, and Cloud Computing, GPC 2017, held in Cetara, Italy, in May 2017 and the following colocated workshops: First International Workshop on Digital Knowledge Ecosystems 2017; and First Workshop on Cloud Security Modeling, Monitoring and Management, CS3M 2017. The 58 full papers included in this volume were carefully reviewed and selected from 169 initial submissions. They deal with cryptography, security and biometric techniques; advances network services, algorithms and optimization; mobile and pervasive computing; cybersecurity; parallel and distributed computing; ontologies and smart applications; and healthcare support systems.
Cloud Computing for Enterprise Architectures
Author: Zaigham Mahmood
Publisher: Springer Science & Business Media
ISBN: 1447122364
Category : Computers
Languages : en
Pages : 332
Book Description
This important text provides a single point of reference for state-of-the-art cloud computing design and implementation techniques. The book examines cloud computing from the perspective of enterprise architecture, asking the question; how do we realize new business potential with our existing enterprises? Topics and features: with a Foreword by Thomas Erl; contains contributions from an international selection of preeminent experts; presents the state-of-the-art in enterprise architecture approaches with respect to cloud computing models, frameworks, technologies, and applications; discusses potential research directions, and technologies to facilitate the realization of emerging business models through enterprise architecture approaches; provides relevant theoretical frameworks, and the latest empirical research findings.
Publisher: Springer Science & Business Media
ISBN: 1447122364
Category : Computers
Languages : en
Pages : 332
Book Description
This important text provides a single point of reference for state-of-the-art cloud computing design and implementation techniques. The book examines cloud computing from the perspective of enterprise architecture, asking the question; how do we realize new business potential with our existing enterprises? Topics and features: with a Foreword by Thomas Erl; contains contributions from an international selection of preeminent experts; presents the state-of-the-art in enterprise architecture approaches with respect to cloud computing models, frameworks, technologies, and applications; discusses potential research directions, and technologies to facilitate the realization of emerging business models through enterprise architecture approaches; provides relevant theoretical frameworks, and the latest empirical research findings.
Distributed and Cloud Computing
Author: Kai Hwang
Publisher: Morgan Kaufmann
ISBN: 0128002042
Category : Computers
Languages : en
Pages : 671
Book Description
Distributed and Cloud Computing: From Parallel Processing to the Internet of Things offers complete coverage of modern distributed computing technology including clusters, the grid, service-oriented architecture, massively parallel processors, peer-to-peer networking, and cloud computing. It is the first modern, up-to-date distributed systems textbook; it explains how to create high-performance, scalable, reliable systems, exposing the design principles, architecture, and innovative applications of parallel, distributed, and cloud computing systems. Topics covered by this book include: facilitating management, debugging, migration, and disaster recovery through virtualization; clustered systems for research or ecommerce applications; designing systems as web services; and social networking systems using peer-to-peer computing. The principles of cloud computing are discussed using examples from open-source and commercial applications, along with case studies from the leading distributed computing vendors such as Amazon, Microsoft, and Google. Each chapter includes exercises and further reading, with lecture slides and more available online. This book will be ideal for students taking a distributed systems or distributed computing class, as well as for professional system designers and engineers looking for a reference to the latest distributed technologies including cloud, P2P and grid computing. - Complete coverage of modern distributed computing technology including clusters, the grid, service-oriented architecture, massively parallel processors, peer-to-peer networking, and cloud computing - Includes case studies from the leading distributed computing vendors: Amazon, Microsoft, Google, and more - Explains how to use virtualization to facilitate management, debugging, migration, and disaster recovery - Designed for undergraduate or graduate students taking a distributed systems course—each chapter includes exercises and further reading, with lecture slides and more available online
Publisher: Morgan Kaufmann
ISBN: 0128002042
Category : Computers
Languages : en
Pages : 671
Book Description
Distributed and Cloud Computing: From Parallel Processing to the Internet of Things offers complete coverage of modern distributed computing technology including clusters, the grid, service-oriented architecture, massively parallel processors, peer-to-peer networking, and cloud computing. It is the first modern, up-to-date distributed systems textbook; it explains how to create high-performance, scalable, reliable systems, exposing the design principles, architecture, and innovative applications of parallel, distributed, and cloud computing systems. Topics covered by this book include: facilitating management, debugging, migration, and disaster recovery through virtualization; clustered systems for research or ecommerce applications; designing systems as web services; and social networking systems using peer-to-peer computing. The principles of cloud computing are discussed using examples from open-source and commercial applications, along with case studies from the leading distributed computing vendors such as Amazon, Microsoft, and Google. Each chapter includes exercises and further reading, with lecture slides and more available online. This book will be ideal for students taking a distributed systems or distributed computing class, as well as for professional system designers and engineers looking for a reference to the latest distributed technologies including cloud, P2P and grid computing. - Complete coverage of modern distributed computing technology including clusters, the grid, service-oriented architecture, massively parallel processors, peer-to-peer networking, and cloud computing - Includes case studies from the leading distributed computing vendors: Amazon, Microsoft, Google, and more - Explains how to use virtualization to facilitate management, debugging, migration, and disaster recovery - Designed for undergraduate or graduate students taking a distributed systems course—each chapter includes exercises and further reading, with lecture slides and more available online
Security and Privacy in the Internet of Things
Author: Ali Ismail Awad
Publisher: John Wiley & Sons
ISBN: 1119607744
Category : Technology & Engineering
Languages : en
Pages : 340
Book Description
SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the authoritative and up-to-date information required for securing IoT architecture and applications The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, Security and Privacy in the Internet of Things: Discusses a broad range of IoT attacks and defense mechanisms Examines IoT security and privacy protocols and approaches Covers both the logical and physical security of IoT devices Addresses IoT security through network traffic modeling Describes privacy preserving techniques in smart cities Explores current threat and vulnerability analyses Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications is essential reading for researchers, industry practitioners, and students involved in IoT security development and IoT systems deployment.
Publisher: John Wiley & Sons
ISBN: 1119607744
Category : Technology & Engineering
Languages : en
Pages : 340
Book Description
SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the authoritative and up-to-date information required for securing IoT architecture and applications The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, Security and Privacy in the Internet of Things: Discusses a broad range of IoT attacks and defense mechanisms Examines IoT security and privacy protocols and approaches Covers both the logical and physical security of IoT devices Addresses IoT security through network traffic modeling Describes privacy preserving techniques in smart cities Explores current threat and vulnerability analyses Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications is essential reading for researchers, industry practitioners, and students involved in IoT security development and IoT systems deployment.
Face Recognition in Adverse Conditions
Author: De Marsico, Maria
Publisher: IGI Global
ISBN: 146665967X
Category : Computers
Languages : en
Pages : 506
Book Description
Facial recognition software has improved by leaps and bounds over the past few decades, with error rates decreasing significantly within the past ten years. Though this is true, conditions such as poor lighting, obstructions, and profile-only angles have continued to persist in preventing wholly accurate readings. Face Recognition in Adverse Conditions examines how the field of facial recognition takes these adverse conditions into account when designing more effective applications by discussing facial recognition under real world PIE variations, current applications, and the future of the field of facial recognition research. The work is intended for academics, engineers, and researchers specializing in the field of facial recognition.
Publisher: IGI Global
ISBN: 146665967X
Category : Computers
Languages : en
Pages : 506
Book Description
Facial recognition software has improved by leaps and bounds over the past few decades, with error rates decreasing significantly within the past ten years. Though this is true, conditions such as poor lighting, obstructions, and profile-only angles have continued to persist in preventing wholly accurate readings. Face Recognition in Adverse Conditions examines how the field of facial recognition takes these adverse conditions into account when designing more effective applications by discussing facial recognition under real world PIE variations, current applications, and the future of the field of facial recognition research. The work is intended for academics, engineers, and researchers specializing in the field of facial recognition.
Human Recognition in Unconstrained Environments
Author: Maria De Marsico
Publisher: Academic Press
ISBN: 0081007124
Category : Computers
Languages : en
Pages : 250
Book Description
Human Recognition in Unconstrained Environments provides a unique picture of the complete ‘in-the-wild’ biometric recognition processing chain; from data acquisition through to detection, segmentation, encoding, and matching reactions against security incidents. Coverage includes: Data hardware architecture fundamentals Background subtraction of humans in outdoor scenes Camera synchronization Biometric traits: Real-time detection and data segmentation Biometric traits: Feature encoding / matching Fusion at different levels Reaction against security incidents Ethical issues in non-cooperative biometric recognition in public spaces With this book readers will learn how to: Use computer vision, pattern recognition and machine learning methods for biometric recognition in real-world, real-time settings, especially those related to forensics and security Choose the most suited biometric traits and recognition methods for uncontrolled settings Evaluate the performance of a biometric system on real world data Presents a complete picture of the biometric recognition processing chain, ranging from data acquisition to the reaction procedures against security incidents Provides specific requirements and issues behind each typical phase of the development of a robust biometric recognition system Includes a contextualization of the ethical/privacy issues behind the development of a covert recognition system which can be used for forensics and security activities
Publisher: Academic Press
ISBN: 0081007124
Category : Computers
Languages : en
Pages : 250
Book Description
Human Recognition in Unconstrained Environments provides a unique picture of the complete ‘in-the-wild’ biometric recognition processing chain; from data acquisition through to detection, segmentation, encoding, and matching reactions against security incidents. Coverage includes: Data hardware architecture fundamentals Background subtraction of humans in outdoor scenes Camera synchronization Biometric traits: Real-time detection and data segmentation Biometric traits: Feature encoding / matching Fusion at different levels Reaction against security incidents Ethical issues in non-cooperative biometric recognition in public spaces With this book readers will learn how to: Use computer vision, pattern recognition and machine learning methods for biometric recognition in real-world, real-time settings, especially those related to forensics and security Choose the most suited biometric traits and recognition methods for uncontrolled settings Evaluate the performance of a biometric system on real world data Presents a complete picture of the biometric recognition processing chain, ranging from data acquisition to the reaction procedures against security incidents Provides specific requirements and issues behind each typical phase of the development of a robust biometric recognition system Includes a contextualization of the ethical/privacy issues behind the development of a covert recognition system which can be used for forensics and security activities