This book investigates the problem of reducing operating cost for a video streaming content delivery network (CDN), including both the CDN’s energy and traffic costs. It first introduces the key issue
This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It examines theories and various state-of-the-art technologies and methodologi
The main goal of this book is to explain the core ideas of process mining, and to demonstrate how they can be implemented using just some basic tools that are available to any computer scientist or da
This book investigates key security issues in connection with the physical layer for random wireless cellular networks. It first introduces readers to the fundamentals of information theoretic securit
This book provides readers the “big picture” and a comprehensive survey of the domain of big data processing systems. For the past decade, the Hadoop framework has dominated the world of big data proc
This book covers a wide range of local image descriptors, from the classical ones to the state of the art, as well as the burgeoning research topics on this area. The goal of this effort is to let rea
This book summarizes various approaches for the automatic detection of health threats to older patients at home living alone. The text begins by briefly describing those who would most benefit from he
This work examines the challenges of distributed map merging and localization in multi-robot systems, which enables robots to acquire the knowledge of their surroundings needed to carry out coordinate
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-s
The key idea of this book is that hinging hyperplanes, neural networks and support vector machines can be transformed into fuzzy models, and interpretability of the resulting rule-based systems can be
This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on establish
This book explains how to combine and exploit sensor networks and internet-of-things (IoT) technologies and Web-service design patterns to enrich and integrate Building Information Models (BIMs). It p
This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduces diffusion models from the fields of computer sc
This book comprehensively illustrates quality-ware scheduling in key-value stores. In addition, it provides scheduling strategies and a prototype framework of quality-aware scheduler as well as a demo
This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluati
This SpringerBrief explores the advantage of relaying techniques in addressing the increasing demand for high data rates and reliable services over the air. It demonstrates how to design cost-effectiv
This book scrutinizes pervasive games from a technological perspective, focusing on the sub-domain of games that satisfy the criteria that they make use of virtual game elements. In the computer game
This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as
The foremost aim of the present study was the development of a tool to detect daily deforestation in the Amazon rainforest, using satellite images from the MODIS/TERRA sensor and Artificial Neural Net
This book offers readers a quick, comprehensive and up-to-date overview of the most important methodologies, technologies, APIs and standards related to the portability and interoperability of cloud a
Presents a detailed study of the major design components that constitute a top-down decision-tree induction algorithm, including aspects such as split criteria, stopping criteria, pruning, and the app
This brief presents a comprehensive introduction to feature coding, which serves as a key module for the typical object recognition pipeline. The text offers a rich blend of theory and practice while
This brief examines current research on cooperative device-to-device (D2D) communication as an enhanced offloading technology to improve the performance of cognitive radio cellular networks. By provid
This brief presents several enhancement modules to Multipath Transmission Control Protocol (MPTCP) in order to support stable and efficient multipath transmission with user cooperation in the Long Ter
This book reviews the state-of-the-art in combinatorial testing, with particular emphasis on the automatic generation of test data. It describes the most commonly used approaches in this area - includ
This SpringerBrief presents channel estimation strategies for the physical later network coding (PLNC) systems. Along with a review of PLNC architectures, this brief examines new challenges brought by
This book describes the mathematical background behind discrete approaches to morphological analysis of scalar fields, with a focus on Morse theory and on the discrete theories due to Banchoff and For
This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. Th
This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and appl
This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also int
This SpringerBrief discusses the characteristics of spatiotemporal movement data, including uncertainty and scale. It investigates three core aspects of Computational Movement Analysis: Conceptual mod
This SpringerBrief explores the internal workings of service systems. The authors propose a lightweight semantic model for an effective representation to capture the essence of service systems. Key to
This Springer Brief represents a comprehensive review of information theoretic methods for robust recognition. A variety of information theoretic methods have been proffered in the past decade, in a l
Digital pathology has experienced exponential growth, in terms of its technology and applications, since its inception just over a decade ago. Though it has yet to be approved for primary diagnostics,
This SpringerBrief discusses the current research on coordinated multipoint transmission/reception (CoMP) in wireless multi-cell systems. This book analyzes the structure of the CoMP precoders and the
This Springer Brief presents a comprehensive survey of the existing methodologies of background subtraction methods. It presents a framework for quantitative performance evaluation of different approa
This Springer Brief covers emerging maritime wideband communication networks and how they facilitate applications such as maritime distress, urgency, safety and general communications. It provides val
This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common me
This Brief introduces the wireless spectrum market and discusses the current research for spectrum auctions. It covers the unique properties of spectrum auction, such as interference relationship, reu
Context-aware systems aim to deliver a rich user experience by taking into account the current user context (location, time, activity, etc.), possibly captured without his intervention. For example, c