Listing 1 - 10 of 27 | << page >> |
Sort by
|
Choose an application
Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as size constraint group testing and connected group testing. Included in this text is a chapter devoted to discussing open problems and suggesting new solutions for various network security problems. This text also exemplifies the connection between mathematical approaches and practical applications to group testing theory in network security. This work will appeal to a multidisciplinary audience with interests in computer communication networks, optimization, and engineering.
Computer networks -- Security measures -- Testing. --- Computer networks --- Civil & Environmental Engineering --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Operations Research --- Telecommunications --- Security measures --- Testing --- Combinatorial group theory. --- Testing. --- Combinatorial groups --- Groups, Combinatorial --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Mathematics. --- Computer communication systems. --- Mathematical optimization. --- Applied mathematics. --- Engineering mathematics. --- Industrial engineering. --- Production engineering. --- Optimization. --- Computer Communication Networks. --- Industrial and Production Engineering. --- Appl.Mathematics/Computational Methods of Engineering. --- Combinatorial analysis --- Group theory --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Mathematical and Computational Engineering. --- Engineering --- Engineering analysis --- Mathematical analysis --- Management engineering --- Simplification in industry --- Value analysis (Cost control) --- Optimization (Mathematics) --- Optimization techniques --- Optimization theory --- Systems optimization --- Maxima and minima --- Operations research --- Simulation methods --- System analysis --- Mathematics --- Manufacturing engineering --- Process engineering --- Industrial engineering --- Mechanical engineering
Choose an application
Choose an application
The papers in this volume were selected for presentation at the 16th Annual InternationalComputing and CombinatoricsConference (COCOON 2010), held duringJuly19-21,2010inNhaTrang,Vietnam.Previousmeetingsofthisconf- encewereheldinSingapore(2002),BigSky(2003),JejuIsland(2004),Kunming (2005), Taipei (2006), Alberta (2007), Dalian (2008) and New York (2009). COCOON 2010 provided a forum for researchers working in the areas of - gorithms, theory of computation, computational complexity, and combinatorics related to computing. In all, 133 papers were submitted from 40 countries and regions, of which 54 were accepted. Authors of the submitted papers were from Australia (10), Bangladesh (11), Belgium (1), Canada (23), Chile (1), China (20), Colombia (1), Czech Republic (6), Denmark (1), France (25), France(1), Germany (13), Greece (2), Hong Kong (7), Hungary (2), India (18), Indonesia (8),IslamicRepublicofIran(2),Ireland(1),Israel(6),Italy(6),Japan(31),- publicofKorea(4),Malaysia(1),TheNetherlands(2),NewZealand(2),Norway (3), Pakistan (1), Poland (1), Portugal (1), Russian Federation (3), Singapore (6), Slovakia (1), Spain (7), Sweden (2), Taiwan (19), Thailand (2), UK (2), USA (44), and Vietnam (15). The submitted papers wereevaluated by an internationalTechnical Program Committee (TPC). Each paper was evaluated by at least three TPC members, with possible assistance of the external referees, as indicated by the referee list found in the proceedings. Some of these 54 accepted papers will be selected for publication in a special issue of Algorithmica, Journal of Combinatorial - timization,and Discrete Mathematics, Algorithms, and Application under the standard refereeing procedure. In addition to the selected papers, the conf- ence also included two invited presentations by Manuel Blum (Carnegie Mellon University) and Oscar H. Ibarra (University of California Santa Barbara).
Complex analysis --- Discrete mathematics --- Mathematics --- Computer science --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- discrete wiskunde --- complexe analyse (wiskunde) --- computers --- grafische vormgeving --- informatica --- externe fixatie (geneeskunde --- algoritmen --- KI (kunstmatige intelligentie) --- computernetwerken --- AI (artificiële intelligentie)
Choose an application
Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and from home to industry. Wireless Sensor Networks and Applications aims to provide a reference tool for the increasing number of scientists who depend upon reliable sensor networks. The book is divided into five sections: design and modeling, network management, data management, security, and applications. The eighteen self-contained chapters are authored by experts in wireless networking. Each chapter is given expository but also scholarly treatment, covering the history of its specific topic, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest. Key Features: *Explores different access control protocols and wake up strategies in wireless sensor networks; *Discusses several time-synchronization techniques and challenges, i.e., directed diffusion, tiny aggression, greedy aggression on directed diffusion; *Provides insights in network security, i.e., secure routing, and proper management; *Elaborates on numerous wireless sensor network applications, i.e., the ExScal application and the XSM platform. The topics covered within this book are intended for researchers, computer engineers, applied mathematicians, and graduate students interested in wireless sensor networks, but uninformed readers may also find this volume stimulating and helpful.
Sensor networks. --- Wireless LANs. --- Wi-Fi LANs --- WiFi LANs --- Wireless local area networks --- WLANs (Wireless LANs) --- Local area networks (Computer networks) --- Wireless communication systems --- Networks, Sensor --- Detectors --- Context-aware computing --- Multisensor data fusion --- Information Technology --- Computer Science (Hardware & Networks) --- Computer Communication Networks. --- Computer science. --- Information systems. --- Models and Principles. --- Information Systems Applications (incl. Internet). --- Computer Appl. in Administrative Data Processing. --- Informatics --- Science --- Computer communication systems. --- Computers. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
Complex Networks is a newly emerging field with applications in a variety of domains, such as communication networks, engineering networks, social networks, and biological networks. There has been an explosive growth of research on complex real-world networks, a theme that is becoming pervasive in many disciplines ranging from mathematics and computer science to the social and biological sciences. Optimization of complex networks with real-world applications requires a deep understanding of the interplay between the dynamics of the physical network and the information dynamics within the network. The Handbook of Optimization in Complex Networks: Theory and Applications provides the basic theory of these networks with several new mathematical approaches and optimization techniques to design and analyze dynamic complex networks. The volume features a wide range of applications and optimization problems derived from research areas such as computer science, operations research, cellular and molecular chemistry, brain physiology, epidemiology, and ecology. This volume, as well as its companion (The Handbook of Optimization in Complex Networks: Communication and Social Networks ISBN: 978-1-4614-0856-7) is an excellent resource for graduate students, researchers, and practitioners who wish to learn about the most up to date theory and applications on optimization of complex real-world networks. .
Computational complexity -- Handbooks, manuals, etc. --- Mathematical optimization -- Handbooks, manuals, etc. --- Network analysis (Planning) -- Handbooks, manuals, etc. --- Mathematical optimization --- Computational complexity --- Network analysis (Planning) --- Civil & Environmental Engineering --- Sociology & Social History --- Social Sciences --- Engineering & Applied Sciences --- Social Change --- Operations Research --- Information networks --- Databases --- Data banks --- Data bases --- Databanks --- Database systems --- Automated information networks --- Networks, Information --- Mathematics. --- Computer communication systems. --- Mathematical optimization. --- Electrical engineering. --- Optimization. --- Computer Communication Networks. --- Communications Engineering, Networks. --- Computer files --- Electronic information resources --- Information services --- Information storage and retrieval systems --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Optimization (Mathematics) --- Optimization techniques --- Optimization theory --- Systems optimization --- Mathematical analysis --- Maxima and minima --- Operations research --- Simulation methods --- System analysis --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
This book constitutes the refereed proceedings of the 22nd International Conference on Computing and Combinatorics, COCOON 2016, held in Ho Chi Minh City, Vietnam, in August 2016. The 50 revised full papers papers presented in this book were carefully reviewed and selected from various submissions. The papers cover various topics including: Theory and Algorithms; Parameterized Complexity and Algorithms; Database and Data Structures; Computational Complexity; Approximation Algorithms; Cryptography; Network and Algorithms; Graph Theory and Algorithms; Computational Geometry; Scheduling Algorithms and Circuit Complexity; Computational Geometry and Computational Biology; and Logic, Algebra and Automata.
Computer science. --- Computer communication systems. --- Computers. --- Algorithms. --- Mathematical logic. --- Computer science --- Artificial intelligence. --- Computer Science. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Computation by Abstract Devices. --- Artificial Intelligence (incl. Robotics). --- Computer Communication Networks. --- Mathematical Logic and Formal Languages. --- Mathematics. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Algorism --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Mathematics --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Algebra --- Arithmetic --- Computer systems --- Cybernetics --- Calculators --- Cyberspace --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Science --- Foundations --- Distributed processing --- Computer software. --- Computational complexity. --- Artificial Intelligence. --- Complexity, Computational --- Software, Computer --- Computer science—Mathematics. --- Discrete mathematics. --- Computer networks. --- Machine theory. --- Theory of Computation. --- Formal Languages and Automata Theory. --- Abstract automata --- Abstract machines --- Automata --- Mathematical machine theory --- Algorithms --- Logic, Symbolic and mathematical --- Recursive functions --- Robotics --- Discrete mathematical structures --- Mathematical structures, Discrete --- Structures, Discrete mathematical --- Numerical analysis
Choose an application
This second volume of the "Handbook Optimization in Complex Networks" presents the most recent research and developments in the application of optimization techniques to the study of complex communication and social networks. This book present several optimization models and their application to a variety of network settings including: online social networks, wireless communication networks, as well as models that describe virus and social media propagation. This book can serve as a useful resource to any student or researcher interested in the application of optimization techniques to communication and or social networks.
Social networks. --- Network analysis (Planning) --- Mathematical optimization. --- Optimization (Mathematics) --- Optimization techniques --- Optimization theory --- Systems optimization --- Project networks --- Networking, Social --- Networks, Social --- Social networking --- Social support systems --- Support systems, Social --- Computational complexity -- Handbooks, manuals, etc. --- Mathematical optimization -- Handbooks, manuals, etc. --- Network analysis (Planning) -- Handbooks, manuals, etc. --- Mathematics. --- Computer communication systems. --- Electrical engineering. --- Optimization. --- Computer Communication Networks. --- Communications Engineering, Networks. --- Mathematical analysis --- Maxima and minima --- Operations research --- Simulation methods --- System analysis --- Planning --- Interpersonal relations --- Cliques (Sociology) --- Microblogs --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Mathematics
Choose an application
Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as size constraint group testing and connected group testing. Included in this text is a chapter devoted to discussing open problems and suggesting new solutions for various network security problems. This text also exemplifies the connection between mathematical approaches and practical applications to group testing theory in network security. This work will appeal to a multidisciplinary audience with interests in computer communication networks, optimization, and engineering.
Choose an application
Choose an application
Office management --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- draadloze computernetwerken --- informatica --- bedrijfsadministratie --- informatiesystemen --- computernetwerken
Listing 1 - 10 of 27 | << page >> |
Sort by
|