Narrow your search

Library

KU Leuven (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

VIVES (3)

VUB (3)

LUCA School of Arts (2)

UGent (2)

ULiège (2)

More...

Resource type

book (5)


Language

English (5)


Year
From To Submit

2012 (5)

Listing 1 - 5 of 5
Sort by

Book
MICRO-45 Workshops 2012 : 2012 IEEE/ACM 45th International Symposium on Microarchitecture Workshops : proceedings : 1-5 December 2012, Vancouver, British Columbia, Canada
Author:
ISBN: 1467349208 1467358460 0769549209 Year: 2012 Publisher: Los Alamitos, California : IEEE Computer Society,


Book
Multilaterally secure pervasive cooperation
Authors: ---
ISBN: 1283920301 161499157X 9781614991571 1614991561 9781614991564 9781614991564 9781283920308 Year: 2012 Publisher: Amsterdam Washington, D.C. IOS Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

The mechanisms which support secure communication, privacy protection and accountability are crucial parts of most computing systems. Pervasive computing is characterized by the large-scale collection, distribution and aggregation of information related to individuals and their activities. From the outset, the inherent privacy and IT security issues of pervasive computing have been an area of critical focus, and associated unforeseeable consequences for the individual have been mentioned. This book addresses these issues, and seeks to demonstrate that carefully devised protection mechanisms can become enablers for multilaterally acceptable and trustworthy digital interactions and ICT-based cooperations. It explores new facets of privacy protection and accountability for digitally recorded real-world actions as well as novel forms of communication in a descriptive manner.A thorough investigation of main pervasive computing concepts is presented, together with a motivation and elicitation of security requirements within the emergency response application domain; also the state-of-the-art of existing security mechanisms is discussed. The areas covered include: digital pseudonyms and auditing mechanisms, efficient encryption techniques and concepts for end-to-end secure messaging, as well as pervasive computing approaches to first response.The book will be of interest to anybody involved in the design, realization and use of secure and privacy-preserving pervasive computing systems and applications.

A nonlinear dynamics perspective of Wolfram's new kind of science.
Author:
ISBN: 9814390526 9789814390521 9814390518 9789814390514 9812569774 9789812569776 9812569766 9789812569769 9789812837936 9812837930 9789814317306 9814317306 9789814460873 9814460877 9812566422 9789812566423 Year: 2012 Publisher: New Jersey

Loading...
Export citation

Choose an application

Bookmark

Abstract

This penultimate volume contains numerous original, elegant, and surprising results in 1-dimensional cellular automata. Perhaps the most exciting, if not shocking, new result is the discovery that only 82 local rules, out of 256, suffice to predict the time evolution of any of the remaining 174 local rules from an arbitrary initial bit-string configuration. This is contrary to the well-known folklore that 256 local rules are necessary, leading to the new concept of quasi-global equivalence . Another surprising result is the introduction of a simple, yet explicit, infinite bit string called the


Book
The digital flood
Author:
ISBN: 9780199980406 0199980403 9780199921553 0199921555 Year: 2012 Publisher: New York Oxford Oxford University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

The history of how computers spread to over 20 nations globally in less than six decades, exploring economic, political, social and technological reasons and consequences. It is based on extensive research into primary and secondary sources, and concludes with a discussion of implications for key players in the globalized economy.


Book
Cellular automata : 10th International Conference on Cellular Automata for Research and Industry, ACRI 2012, Santorini Island, Greece, September 24-27, 2012. Proceedings
Authors: --- ---
ISSN: 03029743 ISBN: 3642333494 3642333508 Year: 2012 Volume: 7495 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 10th International Conference on Cellular Automata for Research and Industry, ACRI 2012, held in Santorini Island, Greece, in September 2012. The 88 revised papers were carefully selected from numerous submissions. In order to give a perspective in which both theoretical and applicational aspects of cellular automata contribute to the growth of the area, this book mirrors the structure of the conference, grouping the 88 papers into two main parts. The first part collects papers presented as part of the main conference and organized according to six main topics: theoretical results on cellular automata; cellular automata dynamics, control and synchronization; cellular automata and networks; modeling and simulation with cellular automata; cellular automata-based hardware and architectures; codes, pseudorandom number generators and cryptography with cellular automata. The second part of the volume is dedicated to contributions presented during the ACRI 2012 workshops on theoretical advances, specifically asynchronous cellular automata, and challenging application contexts for cellular automata: crowds and CA, traffic and CA, and the satellite Workshop on cellular automata of cancer growth and invasion.

Keywords

Engineering & Applied Sciences --- Computer Science --- Cellular automata --- Cellular automata. --- Computers, Iterative circuit --- Iterative circuit computers --- Structures, Tessellation (Automata) --- Tessellation structures (Automata) --- Computer science. --- Computer communication systems. --- Computers. --- Algorithms. --- Computer simulation. --- Computer Science. --- Computation by Abstract Devices. --- Algorithm Analysis and Problem Complexity. --- Simulation and Modeling. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Algorism --- Algebra --- Arithmetic --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Distributed processing --- Parallel processing (Electronic computers) --- Pattern recognition systems --- Sequential machine theory --- Computer software. --- Software, Computer --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Theory of Computation. --- Computer Modelling. --- Computer and Information Systems Applications.

Listing 1 - 5 of 5
Sort by