Pradeep K. Atrey - Böcker
Visar alla böcker från författaren Pradeep K. Atrey. Handla med fri frakt och snabb leverans.
7 produkter
7 produkter
853 kr
Skickas inom 10-15 vardagar
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop.Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection.Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.
1 135 kr
Tillfälligt slut
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop.Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection.Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.
Data Science, AI and Applications
First International Conference, ICDSAIA 2025, Dhaka, Bangladesh, July 18–19, 2025, Proceedings, Part I
Häftad, Engelska, 2026
995 kr
Skickas inom 10-15 vardagar
The three-volume set CCIS 2681–2683 constitutes the post-conference proceedings of the First International Conference on Data Science, Artificial Intelligence and Applications, ICDSAIA 2025, held in Dhaka, Bangladesh, during July 18–19, 2025.The 99 full papers included in this book were carefully reviewed and selected from 190 submissions. They focus on latest advancements in data science, artificial intelligence (AI), and their applications across diverse sectors—including healthcare, education, finance, governance, agriculture, and sustainable development—highlighting its potential to solve pressing societal challenges and accelerate progress toward the Sustainable Development Goals (SDGs).
Data Science, AI and Applications
First International Conference, ICDSAIA 2025, Dhaka, Bangladesh, July 18–19, 2025, Proceedings, Part II
Häftad, Engelska, 2026
995 kr
Skickas inom 10-15 vardagar
The three-volume set CCIS 2681–2683 constitutes the post-conference proceedings of the First International Conference on Data Science, Artificial Intelligence and Applications, ICDSAIA 2025, held in Dhaka, Bangladesh, during July 18–19, 2025.The 99 full papers included in this book were carefully reviewed and selected from 190 submissions. They focus on latest advancements in data science, artificial intelligence (AI), and their applications across diverse sectors—including healthcare, education, finance, governance, agriculture, and sustainable development—highlighting its potential to solve pressing societal challenges and accelerate progress toward the Sustainable Development Goals (SDGs).
Data Science, AI and Applications
First International Conference, ICDSAIA 2025, Dhaka, Bangladesh, July 18–19, 2025, Proceedings, Part III
Häftad, Engelska, 2026
995 kr
Skickas inom 10-15 vardagar
The three-volume set CCIS 2681–2683 constitutes the post-conference proceedings of the First International Conference on Data Science, Artificial Intelligence and Applications, ICDSAIA 2025, held in Dhaka, Bangladesh, during July 18–19, 2025.The 99 full papers included in this book were carefully reviewed and selected from 190 submissions. They focus on latest advancements in data science, artificial intelligence (AI), and their applications across diverse sectors—including healthcare, education, finance, governance, agriculture, and sustainable development—highlighting its potential to solve pressing societal challenges and accelerate progress toward the Sustainable Development Goals (SDGs).
Security in Computing and Communications
International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings
Häftad, Engelska, 2013
556 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers.
540 kr
Skickas inom 10-15 vardagar
Intelligent multimedia surveillance concerns the analysis of multiple sensing inputs including video and audio streams, radio-frequency identification (RFID), and depth data. These data are processed for the automated detection and tracking of people, vehicles, and other objects. The goal is to locate moving targets, to understand their behavior, and to detect suspicious or abnormal activities for crime prevention. Despite its benefits, there is societal apprehension regarding the use of such technology, so an important challenge in this research area is to balance public safety and privacy. This edited book presents recent findings in the field of intelligent multimedia surveillance emerging from disciplines such as multimedia computing, computer vision, and artificial intelligence. It consists of nine chapters addressing intelligent video surveillance, video analysis of crowds, privacy issues in intelligent multimedia surveillance, RFID technology for localization of objects, object tracking using visual saliency information, estimating multiresolution depth using active stereo vision, and performance evaluation for video surveillance systems. The book will be of value to researchers and practitioners working on related problems in security, multimedia, and artificial intelligence.