Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Choose an application
The mechanisms which support secure communication, privacy protection and accountability are crucial parts of most computing systems. Pervasive computing is characterized by the large-scale collection, distribution and aggregation of information related to individuals and their activities. From the outset, the inherent privacy and IT security issues of pervasive computing have been an area of critical focus, and associated unforeseeable consequences for the individual have been mentioned. This book addresses these issues, and seeks to demonstrate that carefully devised protection mechanisms can become enablers for multilaterally acceptable and trustworthy digital interactions and ICT-based cooperations. It explores new facets of privacy protection and accountability for digitally recorded real-world actions as well as novel forms of communication in a descriptive manner.A thorough investigation of main pervasive computing concepts is presented, together with a motivation and elicitation of security requirements within the emergency response application domain; also the state-of-the-art of existing security mechanisms is discussed. The areas covered include: digital pseudonyms and auditing mechanisms, efficient encryption techniques and concepts for end-to-end secure messaging, as well as pervasive computing approaches to first response.The book will be of interest to anybody involved in the design, realization and use of secure and privacy-preserving pervasive computing systems and applications.
Ubiquitous computing. --- Electronic digital computers. --- Pervasive computing --- UbiComp (Computer science) --- Electronic data processing --- Embedded computer systems --- Automatic digital computers --- Computers, Electronic digital --- Digital computers, Electronic --- Computers --- Hybrid computers --- Sequential machine theory --- Distributed processing
Choose an application
This penultimate volume contains numerous original, elegant, and surprising results in 1-dimensional cellular automata. Perhaps the most exciting, if not shocking, new result is the discovery that only 82 local rules, out of 256, suffice to predict the time evolution of any of the remaining 174 local rules from an arbitrary initial bit-string configuration. This is contrary to the well-known folklore that 256 local rules are necessary, leading to the new concept of quasi-global equivalence . Another surprising result is the introduction of a simple, yet explicit, infinite bit string called the
Cellular automata. --- Computational complexity. --- Dynamics. --- Nonlinear theories. --- Nonlinear problems --- Nonlinearity (Mathematics) --- Calculus --- Mathematical analysis --- Mathematical physics --- Dynamical systems --- Kinetics --- Mathematics --- Mechanics, Analytic --- Force and energy --- Mechanics --- Physics --- Statics --- Complexity, Computational --- Electronic data processing --- Machine theory --- Computers, Iterative circuit --- Iterative circuit computers --- Structures, Tessellation (Automata) --- Tessellation structures (Automata) --- Parallel processing (Electronic computers) --- Pattern recognition systems --- Sequential machine theory --- Wolfram, Stephen. --- Wolfram, Stephen,
Choose an application
The history of how computers spread to over 20 nations globally in less than six decades, exploring economic, political, social and technological reasons and consequences. It is based on extensive research into primary and secondary sources, and concludes with a discussion of implications for key players in the globalized economy.
Electronic digital computers --- Technology transfer --- Engineering & Applied Sciences --- Computer Science --- Diffusion of innovations --- Inventions --- Research, Industrial --- Technology and international relations --- Foreign licensing agreements --- Technological forecasting --- Technological innovations --- Technology --- Technological transfer --- Transfer of technology --- Computers --- Hybrid computers --- Sequential machine theory --- Automatic digital computers --- Computers, Electronic digital --- Digital computers, Electronic --- History --- Social aspects --- International cooperation --- 338.043 --- 338.752.2 --- 384.7 --- 654 --- AA / International- internationaal --- 681.3 <09> --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica --- Elektrische constructies. Elektronische toestellen. Elektrische huishoudapparaten --- Tele-informatie. Datatransmissie --- Informatieverwerking. Bureautica --- Computer science--Geschiedenis van
Choose an application
This book constitutes the refereed proceedings of the 10th International Conference on Cellular Automata for Research and Industry, ACRI 2012, held in Santorini Island, Greece, in September 2012. The 88 revised papers were carefully selected from numerous submissions. In order to give a perspective in which both theoretical and applicational aspects of cellular automata contribute to the growth of the area, this book mirrors the structure of the conference, grouping the 88 papers into two main parts. The first part collects papers presented as part of the main conference and organized according to six main topics: theoretical results on cellular automata; cellular automata dynamics, control and synchronization; cellular automata and networks; modeling and simulation with cellular automata; cellular automata-based hardware and architectures; codes, pseudorandom number generators and cryptography with cellular automata. The second part of the volume is dedicated to contributions presented during the ACRI 2012 workshops on theoretical advances, specifically asynchronous cellular automata, and challenging application contexts for cellular automata: crowds and CA, traffic and CA, and the satellite Workshop on cellular automata of cancer growth and invasion.
Engineering & Applied Sciences --- Computer Science --- Cellular automata --- Cellular automata. --- Computers, Iterative circuit --- Iterative circuit computers --- Structures, Tessellation (Automata) --- Tessellation structures (Automata) --- Computer science. --- Computer communication systems. --- Computers. --- Algorithms. --- Computer simulation. --- Computer Science. --- Computation by Abstract Devices. --- Algorithm Analysis and Problem Complexity. --- Simulation and Modeling. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Algorism --- Algebra --- Arithmetic --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Distributed processing --- Parallel processing (Electronic computers) --- Pattern recognition systems --- Sequential machine theory --- Computer software. --- Software, Computer --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Theory of Computation. --- Computer Modelling. --- Computer and Information Systems Applications.
Listing 1 - 5 of 5 |
Sort by
|