Listing 1 - 10 of 76 | << page >> |
Sort by
|
Choose an application
Data are generated at an exponential rate all over the world. Through advanced algorithms and analytics techniques, organizations can harness this data, discover hidden patterns, and use the findings to make meaningful decisions. Containing contributions from leading experts in their respective fields, this book bridges the gap between the vastness of big data and the appropriate computational methods for scientific and social discovery. It also explores related applications in diverse sectors, covering technologies for media/data communication, elastic media/data storage, cross-network media/data fusion, SaaS, and more--
Big data. --- Database management. --- Data mining. --- Machine theory. --- Abstract automata --- Abstract machines --- Automata --- Mathematical machine theory --- Algorithms --- Logic, Symbolic and mathematical --- Recursive functions --- Robotics --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Data sets, Large --- Large data sets --- Data sets --- Aplicaciones de Big Data (71144212) --- Bibliografía recomendada --- Big data --- Database management --- Data mining --- Machine theory
Choose an application
In this fast-paced global economy, academia and industry must innovate to evolve and succeed. Today's researchers and industry experts are seeking transformative technologies to meet the challenges of tomorrow. The cutting-edge technological advances in cybersecurity solutions aids in enabling the security of complex heterogeneous high-performance computing environments. On the other hand, high-performance computing power facilitates powerful and intelligent innovative models for reducing time to response to identify and resolve a multitude of potential new emerging cyber-attacks. Cybersecurity and High-Performance Computing Environments provides a collection of the current and emergent research innovations, practices, and applications focusing on the interdependence of cybersecurity and high-performance computing domains for discovering and resolving new emerging cyber-threats. Key Features: Represents a substantial research contribution to state-of-the-art solutions for addressing the threats to Confidentiality, Integrity, and Availability (CIA Triad) in high-performance computing (HPC) environments. Covers the groundbreaking and emergent solutions that utilize the power of the HPC environments to study and understand the emergent multifaceted anomalous and malicious characteristics. The content will help university students, researchers, and professionals understand how high-performance computing research fits broader cybersecurity objectives and vice versa.
High performance computing. --- Computer security --- Data processing.
Choose an application
Smart Data: State-of-the-Art Perspectives in Computing and Applications explores smart data computing techniques to provide intelligent decision making and prediction services support for business, science, and engineering. It also examines the latest research trends in fields related to smart data computing and applications, including new computing theories, data mining and machine learning techniques. The book features contributions from leading experts and covers cutting-edge topics such as smart data and cloud computing, AI for networking, smart data deep learning, Big Data capture and representation, AI for Big Data applications, and more. Features Presents state-of-the-art research in big data and smart computing Provides a broad coverage of topics in data science and machine learning Combines computing methods with domain knowledge and a focus on applications in science, engineering, and business Covers data security and privacy, including AI techniques Includes contributions from leading researchers
Big data. --- Decision making --- Computer network resources. --- Data processing.
Choose an application
Complex analysis --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- complexe analyse (wiskunde) --- informatica --- computerbesturingssystemen --- informatiesystemen --- software engineering --- OS (operating system) --- computernetwerken
Choose an application
This book constitutes the refereed proceedings of the 8th International Conference on Grid and Pervasive Computing, GPC 2016, held in Seoul, Korea, in May 2016. The 20 revised papers were carefully reviewed and selected from 94 submissions. The conference contains various aspects including green computing, cloud computing, virtualisation, data and storage, and network security.
Computer science. --- Computer communication systems. --- Software engineering. --- Algorithms. --- Information storage and retrieval. --- Computer Science. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Software Engineering. --- Information Storage and Retrieval. --- Algorithm Analysis and Problem Complexity. --- Informatics --- Algorism --- Computer software engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Science --- Algebra --- Arithmetic --- Engineering --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Distributed processing --- Information storage and retrieva. --- Computer software. --- Software, Computer --- Computer systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Cloud computing --- Web services --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Computer and Information Systems Applications. --- Data centers
Choose an application
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes. Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.
Computer security. --- Data encryption (Computer science). --- Coding theory. --- Systems and Data Security. --- Cryptology. --- Coding and Information Theory. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Protection --- Security measures --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes. Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.
Ergodic theory. Information theory --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- cryptografie --- informatica --- computerbeveiliging --- informatietheorie
Choose an application
Computational grids (Computer systems) --- Ubiquitous computing --- Grilles informatiques --- Informatique omniprésente --- Congresses. --- Congrès --- Computational grids (Computer systems) -- Congresses. --- Electronic books. -- local. --- Ubiquitous computing -- Congresses. --- Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer system failures. --- Software engineering. --- Computers. --- Algorithms. --- Computer Science. --- Theory of Computation. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- System Performance and Evaluation. --- Software Engineering. --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Algorism --- Algebra --- Arithmetic --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer software engineering --- Engineering --- Failures --- Distributed processing --- Foundations --- Information theory. --- Computer software. --- Computer system performance. --- Software, Computer --- Communication theory --- Communication --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Electronic digital computers—Evaluation. --- Computer and Information Systems Applications.
Choose an application
This volume contains the proceedings of the 4th International Conference on Frontier Computing (FC 2015), Bangkok, Thailand, September 9-11, 2015, and brings together state-of-the-art results covering many aspects of emerging computer science and information technology from international academic and industrial researchers. FC 2015 aimed at providing an open forum to reach a comprehensive understanding of the recent advances and developing trends in information technology, computer science and engineering, with themes under the scope of communication networks, business intelligence and knowledge management, web intelligence, and any related fields that prompt the development of information technology. Contributions cover a wide spectrum of topics: database and data mining, networking and communications, web and internet of things, embedded system, soft computing, social network analysis, security and privacy, optics communication, and ubiquitous/pervasive computing. Many papers have shown great academic potential and value, and in addition indicate promising directions of research in the focused realm of this conference series. Readers, including students, researchers, and industry professionals, will benefit from the results presented in this book, and it provides indicators for emerging trends for those starting their research careers. .
Computer science. --- Microprogramming. --- Computer communication systems. --- Software engineering. --- Computational intelligence. --- Electrical engineering. --- Computer Science. --- Computer Communication Networks. --- Communications Engineering, Networks. --- Information Systems Applications (incl. Internet). --- Computational Intelligence. --- Control Structures and Microprogramming. --- Software Engineering. --- Telecommunication. --- Engineering. --- Computer software engineering --- Engineering --- Computer programming --- Construction --- Industrial arts --- Technology --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Application software. --- Microprogramming . --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Electric engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Databases --- Information technology --- Computer science
Choose an application
This book gathers high-quality research papers presented at the 3rd International Conference on Advanced Computing and Intelligent Engineering (ICACIE 2018). It includes sections describing technical advances and the latest research in the fields of computing and intelligent engineering. Intended for graduate students and researchers working in the disciplines of computer science and engineering, the proceedings will also appeal to researchers in the field of electronics, as they cover hardware technologies and future communication technologies.
Signal processing. --- Image processing. --- Speech processing systems. --- Computational intelligence. --- Electrical engineering. --- Signal, Image and Speech Processing. --- Computational Intelligence. --- Communications Engineering, Networks. --- Computer systems --- ADP systems (Computer systems) --- Computing systems --- Systems, Computer --- Electronic systems --- Cyberinfrastructure --- Electric engineering --- Engineering --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Computational linguistics --- Information theory --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication)
Listing 1 - 10 of 76 | << page >> |
Sort by
|