This easy-to-read text focuses on challenges in coverage control in sensor networks, examines fundamental coverage problems, and presents the most recent advances and techniques in the field. Features
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack ma
MR technologies play an increasing role in different aspects of human-robot interactions. The visual combination of digital contents with real working spaces creates a simulated environment that is se
This book presents the new development of computation intelligence for traffic, transportation and mobility, the main contents include traffic safety, mobility analysis, intelligent transportation sys
This brief focuses on the current research on location privacy preservation in cognitive radio networks (CRNs). Along with a review of the existing works, this book includes fundamental privacy models
The annual International Conference on Access Networks (AccessNets) aims to provide a forum that brings together researchers and scientists from academia as well as man- ers and engineers from industr
This SpringerBrief focuses on crucial issues for device-to-device (D2D) communications within the rapidly expanding 4G LTE toward 5G system. Several critical technical challenges in D2D com
Given the extensive application of random walks in virtually every science related discipline, we may be at the threshold of yet another problem solving paradigm with the advent of quantum walks. Over
This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc n
This volume includes extended and revised versions of a set of selected papers from the 2011 2nd International Conference on Education and Educational Technology (EET 2011) held in Chengdu, China, Oct
This book provides a candid assessment and practical knowledge about the current technological advancements of the wireless healthcare system. This book presents the competencies of modeling e-health
"Pattern Recognition, Machine Intelligence and Biometrics" covers the most recent developments in Pattern Recognition and its applications, using artificial intelligence technologies within an increas
This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the boo
This two volume set LNCS 9418 and LNCS 9419 constitutes the proceedings of the 16th International Conference on Web Information Systems Engineering, WISE 2015, held in Miami, FL, USA, in November 2015
Managing and Mining Graph Data is a comprehensive survey book in graph management and mining. It contains extensive surveys on a variety of important graph topics such as graph languages, indexing, cl
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Arts and Technology, ArtsIT 2009, which was held in September 2009 in Yi-Lan, Taiwan.
The Definitive Guide to HTML5 WebSocket is the ultimate insider’s WebSocket resource. This revolutionary new web technology enables you to harness the power of true real-time connectivity and build re
This book constitutes the refereed proceedings of the 24th Australasian Joint Conference on Artificial Intelligence, AI 2011, held in Perth, Australia, in December 2011. The 82 revised full papers pre
Action recognition technology has many real-world applications in human-computer interaction, surveillance, video retrieval, retirement home monitoring, and robotics. The commoditization of depth sens
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though
This work covers sequence-based protein homology detection, a fundamental and challenging bioinformatics problem with a variety of real-world applications. The text first surveys a few popular homolog
Mixed Reality is moving out of the research-labs into our daily lives. It plays an increasing role in architecture, design and construction. The combination of digital content with reality creates an
The focus of Mining Sequential Patterns from Large Data Sets is on sequential pattern mining. In many applications, such as bioinformatics, web access traces, system utilization logs, etc., the data i
This book constitutes the refereed proceedings of the 6th China Conference on Advances in Wireless Sensor Networks, held in Huangshan, China, in October 2012. The 70 revised full papers were carefully
The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicat
This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the l
This brief provides a detailed introduction, discussion and bibliographic review of the nature1-inspired optimization algorithm called Harmony Search. It uses a large number of simulation results to d
This book presents a systematic study of visual pattern discovery, from unsupervised to semi-supervised manner approaches, and from dealing with a single feature to multiple types of features. Further
This brief presents the novel PHY layer technique, attachment transmission, which provides an extra control panel with minimum overhead. In addition to describing the basic mechanisms of this techniqu
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011.
The problem of structure and motion recovery from image sequences is an important theme in computer vision. Considerable progress has been made in this field during the past two decades, resulting in
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2016, held in Beiji
This book is a collection of writings by active researchers in the field of Artificial General Intelligence, on topics of central importance in the field. Each chapter focuses on one theoretical probl
This book constitutes the refereed proceedings of the 9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014, held in Harbin, China, in June 2014. The 41 revised full
This book constitutes the refereed proceedings of the 7th International Workshop on Machine Learning in Medical Imaging, MLMI 2016, held in conjunction with MICCAI 2016, in Athens, Greece, in October
This book constitutes the proceedings of the 6th International Workshop on Machine Learning in Medical Imaging, MLMI 2015, held in conjunction with MICCAI 2015, in Munich in October 2015.The 40 full p
This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1
Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened? Why did it happen? What should I do? Answers to the first two questions form
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, p
This book constitutes the refereed proceedings of the 11th International Conference on Information and Communications Security, ICICS 2009, held in Beijing, China, in December 2009.The 37 revised full