The brief focuses on applying sublinear algorithms to manage critical big data challenges. The text offers an essential introduction to sublinear algorithms, explaining why they are vital to large sca
This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust th
Developers frequently introduce errors into software systems when they fail to recognise module dependencies. Using forty-three software families and Software Product Lines (SPLs), where the majority
This SpringerBrief presents the principles, methods, and workflows for processing and analyzing coastal LiDAR data time-series. Robust methods for computing high resolution digital elevation models (D
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in secu
This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover a variety of topics, including environmental surv
This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors ad
The development of effective methods for the prediction of ontological annotations is an important goal in computational biology, yet evaluating their performance is difficult due to problems caused b
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11? based wireless networks, IP-based multimedia communications over w
Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pai
Distributed Space-Time Coding (DSTC) is a cooperative relaying scheme that enables high reliability in wireless networks. This brief presents the basic concept of DSTC, its achievable performance, gen
The amount and the complexity of the data gathered by current enterprises are increasing at an exponential rate. Consequently, the analysis of Big Data is nowadays a central challenge in Computer Scie
Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the
Machine learning and nonparametric function estimation procedures can be effectively used in forecasting. One important and current application is used to make forecasts of “future dangerousness" to i
The book describes the world's first successful experiment in fully automated board game design. Evolutionary methods were used to derive new rule sets within a custom game description language, and s
Image compression is concerned with minimization of the number of information carrying units used to represent an image. Lossy compression techniques incur some loss of information which is usually im