This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack ma
This brief focuses on the current research on location privacy preservation in cognitive radio networks (CRNs). Along with a review of the existing works, this book includes fundamental privacy models
The annual International Conference on Access Networks (AccessNets) aims to provide a forum that brings together researchers and scientists from academia as well as man- ers and engineers from industr
This SpringerBrief focuses on crucial issues for device-to-device (D2D) communications within the rapidly expanding 4G LTE toward 5G system. Several critical technical challenges in D2D com
This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc n
This volume includes extended and revised versions of a set of selected papers from the 2011 2nd International Conference on Education and Educational Technology (EET 2011) held in Chengdu, China, Oct
This book provides a candid assessment and practical knowledge about the current technological advancements of the wireless healthcare system. This book presents the competencies of modeling e-health
This two volume set LNCS 9418 and LNCS 9419 constitutes the proceedings of the 16th International Conference on Web Information Systems Engineering, WISE 2015, held in Miami, FL, USA, in November 2015
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Arts and Technology, ArtsIT 2009, which was held in September 2009 in Yi-Lan, Taiwan.
The Definitive Guide to HTML5 WebSocket is the ultimate insider’s WebSocket resource. This revolutionary new web technology enables you to harness the power of true real-time connectivity and build re
This book constitutes the refereed proceedings of the 24th Australasian Joint Conference on Artificial Intelligence, AI 2011, held in Perth, Australia, in December 2011. The 82 revised full papers pre
Action recognition technology has many real-world applications in human-computer interaction, surveillance, video retrieval, retirement home monitoring, and robotics. The commoditization of depth sens
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though
This work covers sequence-based protein homology detection, a fundamental and challenging bioinformatics problem with a variety of real-world applications. The text first surveys a few popular homolog
This book constitutes the refereed proceedings of the 6th China Conference on Advances in Wireless Sensor Networks, held in Huangshan, China, in October 2012. The 70 revised full papers were carefully
The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicat
This brief provides a detailed introduction, discussion and bibliographic review of the nature1-inspired optimization algorithm called Harmony Search. It uses a large number of simulation results to d
This book presents a systematic study of visual pattern discovery, from unsupervised to semi-supervised manner approaches, and from dealing with a single feature to multiple types of features. Further
This brief presents the novel PHY layer technique, attachment transmission, which provides an extra control panel with minimum overhead. In addition to describing the basic mechanisms of this techniqu
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011.
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2016, held in Beiji
This book constitutes the refereed proceedings of the 9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014, held in Harbin, China, in June 2014. The 41 revised full
This book constitutes the refereed proceedings of the 7th International Workshop on Machine Learning in Medical Imaging, MLMI 2016, held in conjunction with MICCAI 2016, in Athens, Greece, in October
This book constitutes the proceedings of the 6th International Workshop on Machine Learning in Medical Imaging, MLMI 2015, held in conjunction with MICCAI 2015, in Munich in October 2015.The 40 full p
This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1
Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened? Why did it happen? What should I do? Answers to the first two questions form
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, p
This book constitutes the refereed proceedings of the 11th International Conference on Information and Communications Security, ICICS 2009, held in Beijing, China, in December 2009.The 37 revised full
The authors present a study of the H-infinity control problem and related topics for descriptor systems, described by a set of nonlinear differential-algebraic equations. They derive necessary and suf
This book presents two collaborative prediction approaches based on contextual representation and hierarchical representation, and their applications including context-aware recommendation, latent col
This book gathers the Proceedings of the International Conference on Mechatronics and Intelligent Robotics (ICMIR2017), held in Kunming, China, on May 20–21, 2017. The book covers a total of 172 paper
This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which include
This volume constitutes the thoroughly refereed post-conference proceedings of the 11th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2015, held in Dallas,
This book constitutes the refereed proceedings of the 11th Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2016, held in Auckland, New Zealand, in April 2016 in conjunction with
This SpringerBrief explores graphical password systems and examines novel drawing-based methods in terms of security, usability, and human computer-interactions. It provides a systematic approach for
This book constitutes the thoroughly refereed post-workshop proceedings at PAKDD Workshops 2016, held in conjunction with PAKDD, the 20th Pacific-Asia Conference on Knowledge Discovery and Data Mining
This book constitutes the refereed proceedings of the First International Workshop on Machine Learning in Medical Imaging, MLMI 2010, held in conjunction with MICCAI 2010, in Beijing, China, in Septem
This book constitutes the refereed proceedings of the First International Conference on Blockchain, ICBC 2018, held as part of the Services Conference Federation, SCF 2018, in Seattle, USA, in June 20
This book highlights the latest research findings, innovative research results, methods and development techniques, from both theoretical and practical perspectives, in the emerging areas of informati
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, held in Beijing, China, in July 2011. The 8 revised full papers and th