This Springer Brief focuses on the current state-of-the-art research on spectrum sensing by using energy detection, a low-complexity and low-cost technique. It includes a comprehensive summary of rece
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in secu
This brief introduces the fundamental theory and development of managing radio resources using a water-filling algorithm that can optimize system performance in wireless communication. Geometric Water
This brief provides methods for harnessing Twitter data to discover solutions to complex inquiries. The brief introduces the process of collecting data through Twitter’s APIs and offers strategies for
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial f
This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy a
This brief presents several new query processing techniques, called complex motion pattern queries, specifically designed for very large spatio-temporal databases of moving objects. The brief begins w
This brief examines resource allocation and interference management for 4G femtocells. It introduces 4G femtocells in the context of 4G mobile networks and discusses related technical challenges in re
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber
This SpringerBrief presents a survey of data center network designs and topologies and compares several properties in order to highlight their advantages and disadvantages. The brief also explores sev
IP-based multimedia communications have become increasingly popular in recent years. With the increasing coverage of the IEEE 802:11? based wireless networks, IP-based multimedia communications over w
This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless
Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the
Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples
This book constitutes the proceedings of the 9th European Conference on Software Architecture, ECSA 2015, held in Dubrovnik / Cavtat, in September 2015 The 12 full papers and 15 short papers presented
Content-based 3-D object retrieval has attracted extensive attention recently and has applications in a variety of fields, such as, computer-aided design, tele-medicine,mobile multimedia, virtual real
Linked Open Data (LOD) is a pragmatic approach for realizing the Semantic Web vision of making the Web a global, distributed, semantics-based information system. This book presents an overview on the
This engaging and accessible book presents a set of representative concepts connected by the theme of information security, demonstrating how each allows us to solve real problems. The discussions are
This brief presents the challenges and solutions for VANETs’ security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network M
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to applicati
This book constitutes the refereed proceedings of the 6th International Conference on Hybrid Learning, ICHL 2013, held in Toronto, ON, Canada, in August 2013. The 35 papers presented in this volume we
This volume constitutes the refereed proceedings of the 11th International Conference on Applied Parallel and Scientific Computing, PARA 2012, held in Helsinki, Finland, in June 2012. The 35 revised f
Since the advent of the Semantic Web, interest in the dynamics of ontologies (ontology evolution) has grown significantly. Belief revision presents a good theoretical framework for dealing with this p
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the
This book constitutes the proceedings of the 5th International Conference, FUN 2010, held in June 2010 in Ischia, Italy. FUN with algorithms is a three-yearly conference that aims at atractings works
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the
Lecture Notes in Computer ScienceThe LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enj
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the
This book constitutes the refereed proceedings of the 9th International Conference on Intelligent Data Analysis, IDA 2010, held in Tucson, AZ, USA in May 2010. The 21 revised papers presented together
This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Applications of Natural Language to Information Systems, NLDB 2009, held in Saarbrucke
This volume constitutes the thoroughly refereed post-conference proceedings of the 19th International Symposium on Logic-Based Program Synthesis and Transformation, LOPSTR 2009, held in Coimbra, Portu
This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Symposium on High Performance Computing Systems and Applications, HPCS 2009, held in Kingston, Canad
This book constitutes the proceedings of the 5th International Conference, CPC 2010 , held in Hualien, Taiwan in May 2010. The 67 full papers are carefully selected from 184 submissions and focus on t
This book constitutes the proceedings of the 8th International Conference on Pervasive Computing, Pervasive 2010, held in Helsinki, Finland, in May 2010. The 24 full papers and one note presented were
This volume constitutes the refereed proceedings of the 6th International Symposium on Bioinformatics Research and Applications, ISBRA 2010, held in Storrs, CT, USA, in May 2010.The 20 revised full pa
This book constitutes the proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP. The 47 papers were carefully selected from 157 submissions a
This book constitutes the refereed proceedings of the 10th European Conference on Evolutionary Computation in Combinatorial Optimization, EvoCOP 2010, held in Instanbul, Turkey, in April 2010.The 24 r
Genetic Programming comprises of proceedings of the 12th European Conference on Genetic Programming, EuroGP 2010. Topics include novel models, performance enhancements, extensions of genetic programmi